Healthcare Security and your Doctor’s Cellphone
Healthcare security: does your doctor's cellphone endanger your medical data? The post Healthcare Security and your Doctor’s Cellphone appeared first on ITsecurity.
View ArticleRansomwhere? – detecting new ransomware
Patrick Wardle's Ransomwhere? for OS X flags processes as dangerous if they seem to encrypt files. The post Ransomwhere? – detecting new ransomware appeared first on ITsecurity.
View ArticleTeslaCrypt: We’re Sorry, Here’s the Decryption Key
Are the TeslaCrypt operators genuinely apologizing? Probably not, since it seems that they may well have moved on to CryptXXX rather than retiring to a monastery to flagellate themselves with birch...
View ArticleBank Fraud: Whose Fault?
Owing to a houseful of grandchildren, I’ve not been giving quite the same attention to security news just lately as I do normally, so I nearly missed an article by John Leyden for The Register: Bank in...
View ArticleStuxnet: more historical than hysterical, I hope
I don’t make a habit of using this blog to advertise another, but the article I’m going to talk about is just too long to rewrite for this blog. And in fact, I’m not generally a fan of articles that...
View ArticleSan Bernardino: what does the security industry think?
While Apple's head is above the parapet over the San Bernardino forensic issue, the security industry (mostly) offers subdued support. The post San Bernardino: what does the security industry think?...
View ArticleInternet of Things? *All I want is a proper cup of coffee…
Does everything have to be attached to the Internet of Things? The post Internet of Things? *All I want is a proper cup of coffee… appeared first on ITsecurity.
View ArticleBuzzwords and Booth Bunnies
RSA: looking for ideas that are really going to make a difference, rather than old ideas disguised as new buzzwords? The post Buzzwords and Booth Bunnies appeared first on ITsecurity.
View ArticleVirus hoaxes still thrive while ‘Sonia disowns Rahul’
Sonia may have disowned Rahul, but virus hoaxes are still with us, though nowadays more often found in social media than in email. The post Virus hoaxes still thrive while ‘Sonia disowns Rahul’...
View ArticleHealthcare, IoT, and security marketing
I’ve grown blasé about the way that some sectors of the security industry badmouth mainstream antimalware in a bid to capture some of that market. And, believe it or not, I don’t have a problem with it...
View ArticleFacebook’s not-so-smart algorithms
Facebook’s suggestions for pages I might like are a constant source of amusement and bewilderment. Music stuff, OK. I’m not quite at the stage yet where my life is more focused on music than on...
View ArticleWhat makes a good CISO?
The role of the CISO is a little different to the stuff I usually post here, but my ESET colleague Stephen Cobb is currently running a research project, ‘a study of what it takes to be an effective...
View ArticleRobocalls: Automating Nuisance Calls
Recently I received an email from Nikki Courtney of Radio KTRH, in Houston, requesting a radio interview on robocalls. Why me, I’m not sure, unless it was because of an article I wrote earlier this...
View ArticleRansomware at the University of Hard Knocks
I recently happened across an article by ‘next-gen’ provider SentinelOne about ransomware attacks experienced by universities in the UK: Freedom of Information requests reveal 6 out of 10 universities...
View ArticlePhysical security and quantum computing
There is probably not a great deal that quantum computing can do to benefit physical security. As previously noted, biometrics may be improved, and these are being increasingly used for physical access...
View ArticleAlas, we can’t rewind America – or can we?
Late last summer my son called me from Seattle to let me know that he would be making a cash deposit to my bank to repay a small loan I had given him over the summer. An hour later, he called back...
View ArticleFacing the Realities of VR and AR
It’s hard to separate important innovations from mere fads. The technology industry can be especially difficult in this regard, constantly throwing out curve-balls that take analysts by surprise. So...
View ArticleFast Incident Response Expected
From time to time, I like to compare and contrast the nascent Information Security profession with more traditional and established occupations. For example when I had lunch with a police officer...
View ArticleYet more VR announcements add confusion to a crowded market
Virtual Reality saw a lot of news in the first week of October, which has done little to clarify or stabilise a marketplace that many already see as confusing and complicated. The first big...
View ArticleTargeted Advertising — a new farce in one Act
Ain’t targeted advertising wonderful? Top of the list of adverts that LinkedIn thinks I might be interested is Dessy. I’ve never heard of Dessy. This is what it offered me: If you actually know me you...
View Article