ITsecurity
twitter facebook rss

RTFC – the C stands for Contract

Posted by Kevin on April 17, 2016

Information is power. Professionally it gives us a bit of an edge. So we all look out for those whitepapers and studies that might give us that edge. When I saw information about iSherrif’s new whitepaper… …I wanted to know more. I am already worried about Microsoft and O365, so it would be interesting to […]

Decisions, decisions…

Posted by Kevin on April 12, 2016

Oh, decisions, decisions… always these hard decisions. Should I or shouldn’t I? What would you do in my shoes? Would it help if I told you that I suspect bunny cutiegiggles is really a 400 lb tattooed Irish wrestler? Oh, dear. Is that racist? Should it matter who I talk to?

Oculus Rift – disruptive technology?

Posted by Kevin on March 27, 2016

With its public release imminent and its starting retail price finally revealed, most people will be aware of the Oculus Rift. The upcoming virtual reality console is very much in the media limelight right now, with both positive and negative press generating attention. While the Rift is certainly the spearhead of mainstream virtual reality, it’s […]

I love Avast, but…

Posted by Kevin on March 21, 2016

Don’t get me wrong. I love Avast. I use Avast – well, the free version at least. Free software comes with a contract – it usually requires you to give up some or a lot of personal information. It’s your choice to accept or reject this contract. But it’s difficult for a security firm to […]

Obama is wrong about passwords

Posted by Kevin on March 17, 2016

Obama is wrong about passwords. He’s not alone, but given the quantity and quality of his advisers, it is very disappointing. This is what he said: In partnership with industry, we’re launching a new national awareness campaign to raise awareness of cyberthreats and encourage more Americans to move beyond passwords—adding an extra layer of security like […]

Ad blocking is good security practice

Posted by Kevin on March 16, 2016

The combination of malvertising and ransomware is particularly pernicious. The former, we are told, cannot be stopped while the latter cannot be reversed. To be sure, it still requires a successful exploit – but add one unpatched system or one zero-day exploit to the mix and you’re up the proverbial without a whatsit. But ad […]

The Juniper backdoor and its implications

Posted by Kevin on March 14, 2016

In December 2015 Juniper disclosed that it had found two backdoors in its firewalls – one of which allows encrypted traffic passing through to be decrypted. Since then there has been considerable debate over what it is and where it came from; but very little debate over the implications. A Chatham House discussion among CISO […]

The Joys of Automated Systems

Posted by Kevin on March 9, 2016

Automated Systems… One Yesterday I got followed on Twitter by CoinTelegraph Espana. I didn’t follow back. Although the account has 10,000 followers, it has only ever posted 2 tweets. What is point, I asked myself. Today I checked back. Still only 2 tweets; but, hey, I have been unfollowed already! This bot obviously picks random […]

Privacy Shield, and the FBI Vs Apple

Posted by Kevin on March 9, 2016

Why does the European Commission continue to insist that Privacy Shield will protect European data from unauthorized US government access when anyone with half a brain cell knows it won’t? Here’s an example, somewhat abstracted from a report in Bloomberg. The FBI (you might possibly have already heard about this) is demanding that Apple develop […]

DDoS – we got hit this week

Posted by Kevin on March 5, 2016

We got hit by DDoS this week. It came in waves. The site was down for at least six hours with each wave, which seemed to come every 20 hours or so. This is what it did to our page views. Of course it didn’t hurt us financially because ITsecurity.co.uk is a labour of conscience, […]