Quantcast
Channel: David Harley – ITsecurity
Browsing all 141 articles
Browse latest View live

Healthcare Security and your Doctor’s Cellphone

Healthcare security: does your doctor's cellphone endanger your medical data? The post Healthcare Security and your Doctor’s Cellphone appeared first on ITsecurity.

View Article


Ransomwhere? – detecting new ransomware

Patrick Wardle's Ransomwhere? for OS X flags processes as dangerous if they seem to encrypt files. The post Ransomwhere? – detecting new ransomware appeared first on ITsecurity.

View Article


TeslaCrypt: We’re Sorry, Here’s the Decryption Key

Are the TeslaCrypt operators genuinely apologizing? Probably not, since it seems that they may well have moved on to CryptXXX rather than retiring to a monastery to flagellate themselves with birch...

View Article

Bank Fraud: Whose Fault?

Owing to a houseful of grandchildren, I’ve not been giving quite the same attention to security news just lately as I do normally, so I nearly missed an article by John Leyden for The Register: Bank in...

View Article

Stuxnet: more historical than hysterical, I hope

I don’t make a habit of using this blog to advertise another, but the article I’m going to talk about is just too long to rewrite for this blog. And in fact, I’m not generally a fan of articles that...

View Article


San Bernardino: what does the security industry think?

While Apple's head is above the parapet over the San Bernardino forensic issue, the security industry (mostly) offers subdued support. The post San Bernardino: what does the security industry think?...

View Article

Internet of Things? *All I want is a proper cup of coffee…

Does everything have to be attached to the Internet of Things? The post Internet of Things? *All I want is a proper cup of coffee… appeared first on ITsecurity.

View Article

Buzzwords and Booth Bunnies

RSA: looking for ideas that are really going to make a difference, rather than old ideas disguised as new buzzwords? The post Buzzwords and Booth Bunnies appeared first on ITsecurity.

View Article


Virus hoaxes still thrive while ‘Sonia disowns Rahul’

Sonia may have disowned Rahul, but virus hoaxes are still with us, though nowadays more often found in social media than in email. The post Virus hoaxes still thrive while ‘Sonia disowns Rahul’...

View Article


Healthcare, IoT, and security marketing

I’ve grown blasé about the way that some sectors of the security industry badmouth mainstream antimalware in a bid to capture some of that market. And, believe it or not, I don’t have a problem with it...

View Article

Facebook’s not-so-smart algorithms

Facebook’s suggestions for pages I might like are a constant source of amusement and bewilderment. Music stuff, OK. I’m not quite at the stage yet where my life is more focused on music than on...

View Article

What makes a good CISO?

The role of the CISO is a little different to the stuff I usually post here, but my ESET colleague Stephen Cobb is currently running a research project, ‘a study of what it takes to be an effective...

View Article

Robocalls: Automating Nuisance Calls

Recently I received an email from Nikki Courtney of Radio KTRH, in Houston, requesting a radio interview on robocalls. Why me, I’m not sure, unless it was because of an article I wrote earlier this...

View Article


Ransomware at the University of Hard Knocks

I recently happened across an article by ‘next-gen’ provider SentinelOne about ransomware attacks experienced by universities in the UK: Freedom of Information requests reveal 6 out of 10 universities...

View Article

Image may be NSFW.
Clik here to view.

Physical security and quantum computing

There is probably not a great deal that quantum computing can do to benefit physical security. As previously noted, biometrics may be improved, and these are being increasingly used for physical access...

View Article


Image may be NSFW.
Clik here to view.

Alas, we can’t rewind America – or can we?

Late last summer my son called me from Seattle to let me know that he would be making a cash deposit to my bank to repay a small loan I had given him over the summer. An hour later, he called back...

View Article

Image may be NSFW.
Clik here to view.

Facing the Realities of VR and AR

It’s hard to separate important innovations from mere fads. The technology industry can be especially difficult in this regard, constantly throwing out curve-balls that take analysts by surprise. So...

View Article


Image may be NSFW.
Clik here to view.

Fast Incident Response Expected

From time to time, I like to compare and contrast the nascent Information Security profession with more traditional and established occupations. For example when I had lunch with a police officer...

View Article

Image may be NSFW.
Clik here to view.

Yet more VR announcements add confusion to a crowded market

Virtual Reality saw a lot of news in the first week of October, which has done little to clarify or stabilise a marketplace that many already see as confusing and complicated. The first big...

View Article

Image may be NSFW.
Clik here to view.

Targeted Advertising — a new farce in one Act

Ain’t targeted advertising wonderful? Top of the list of adverts that LinkedIn thinks I might be interested is Dessy. I’ve never heard of Dessy. This is what it offered me: If you actually know me you...

View Article
Browsing all 141 articles
Browse latest View live