Still in Denial of the Tough New Privacy Law GDPR?
This morning GDPR on the news, shared by Rachel Oconnell : Firms Are in Denial About Tough New EU Privacy Law: The world’s toughest privacy law will go into force in Europe 18 months from now, and so...
View ArticleDOS challenges with ITsecurity.co.uk
We were faced with a problem which was at first out of our control: “somebody” is creating, probably without knowing, a denial of service on this website. The consequence was that it was “consuming”...
View ArticleLock up your data – the British IPB is coming
Until a year before the Brexit referendum, I was firmly in favour of the UK leaving the EU. This was because I have zero faith in European politicians. Then I did a 180. This was because I have even...
View ArticleIPB Excuse #73
A new report from the government-backed Get Safe Online organization says that almost £11 billion pounds was lost to fraud and cyber crime in the UK last year. That translates to £210 for everybody...
View ArticleIPB excuse #74
Investigatory Powers Bill (IPB) in the Lords; from Hansard: Baroness Jones of Moulsecoomb (Green Party) The amendment simply requires, first, a threshold of reasonable suspicion that a serious crime...
View ArticleBritish Politics – a short guide
Background It’s often thought that British politics is divided into the Left and the Right. This is not strictly true. The Left comprises the Labour Party; the Right comprises the Conservative Party –...
View ArticleRansomware, Support Scams, and Old-School 419s
Ransomware is the buzzword of the moment, but other scams haven't gone away. Some are even converging with ransomware. The post Ransomware, Support Scams, and Old-School 419s appeared first on ITsecurity.
View ArticleSupport scams and Balance
I believe in balance. All problems are caused by imbalance. Illnesses are caused by imbalances in the body; wars are caused by imbalances in the ether; and even support scams are caused by imbalance. I...
View ArticleBook Review: Game Hacking, by Nick Cano
Nick Cano’s Game Hacking walks an unusual line between gaming, computer security and coding. Many involved in the gaming industry, especially with online gaming, know that security can be just as...
View ArticleThe Jester dilemma
The Jester is, for me, a huge moral dilemma. Hacking is against the law. Jester is considered to be a private pro-America individual cyber vigilante hacker. But is he? The FBI has huge success in...
View ArticleNintendo Switch reveal wows gamers but alienates stock market
With Nintendo’s secretive ‘NX’ project finally given a trailer reveal as the Nintendo Switch, gamers have finally been given some answers on Nintendo’s new product, but there are still some important...
View ArticleTrust Us, We’re Facebook
Facebook has inconspicuously announced that it intends ‘to begin allowing more items that people find newsworthy, significant, or important to the public interest — even if they might otherwise violate...
View ArticleWhat makes a PUP?
I’ve been thinking about PUPs recently. Some people call them PUAs; but PUP (potentially unwanted program) has an onomatopoeic ring to it. These are the apps you choose because they say they do one...
View ArticleAlgorithms, Arrogance and Collateral Damage
Artificial intelligence (AI) is the future. It’s a complex subject that basically boils down to mathematics. Mathematical rules, or algorithms, process data and deliver decisions (actually, they...
View ArticleIncentivized hyperbole
I laugh a lot these days. It’s the fail safe response of my CPS – my Crying Prevention System. After all, real men don’t cry, do they? But what can you do when every day brings a new absurdity that...
View ArticleSANS, Signatures, Next-Gen and DIY Testing
SANS has done some good work in security, but its webcast on next-gen product evaluation is based on fallacies.The post SANS, Signatures, Next-Gen and DIY Testing appeared first on ITsecurity.
View ArticleScaring the children, by MI5
Those who correlate such things will have no surprise over Tuesday’s Guardian interview – the big guns are always rolled out just before contentious bills come before parliament for their final vote....
View ArticleThe Daily Mail’s betrayal of democracy
If you value freedom and democracy, shun the Daily Mail – it has become nothing more than an instrument of Tory government that ignores the law of the land. This week’s front page is just the latest...
View ArticleWire-Wire Scams: Evolution beyond the 419
West African cybercrime nowadays has moved on from unsophisticated 419s to technically-based, effective Wire-Wire attacks on businesses.The post Wire-Wire Scams: Evolution beyond the 419 appeared first...
View ArticleChina introduces new laws restricting freedom on the internet
China has green-lit a sweeping and controversial law that may grant Beijing unprecedented access to foreign companies’ technology and hamstring their operations in the world’s second-largest...
View Article