ITsecurity
twitter facebook rss

Private company CONCENTRIX acting on belhaf of HMRC

Posted by Tara Taubman-Bassirian on July 12, 2016

  UPDATE : 14th September 2016, after a too long debacle, HMRC has decided not to extend contract with Concentrix following outcry over wrong tax credit cuts. HMRC contractor who failed to repay customers’ tax credits will still be paid tens of millions Tasmina Sheikh MP Verified account ‏@TasminaSheikh Families are still living a day […]

San Bernardino: what does the security industry think?

Posted by David Harley on February 19, 2016

David Harley photo

While Apple’s head is above the parapet over the San Bernardino forensic issue, the security industry (mostly) offers subdued support.

Applesauce, The Apple FBI Backdoor

Posted by Martin Zinaich on February 19, 2016

The Apple FBI Backdoor While the FBI has been after Apple to create a backdoor to iOS, this recent episode stems from the December attacked of Syed Rizwan Farook who killed 14. Farook had expressed support for the Islamic State on a Facebook page and there are still many questions about whom the shooter might […]

Why CTO’s should enforce adblocking on their networks

Posted by Alexander Hanff on July 13, 2015

Recent research from Simon Fraser University in British Columbia has illustrated that blocking advertising on their enterprise network cut bandwidth usage by 25-40%.  They used AdblockPlus, the most popular browser plugin in the world, for a period of six weeks and actively recorded how it impacted network traffic and bandwidth consumption.  In their paper they […]

iStorage FIPS 140-2 Encrypted Storage Devices

Posted by Alexander Hanff on May 28, 2015

My first Privacy News Video is a review of i-Storage’s FIPS 140-2 Certified Hardware Encrypted Storage Devices. Given the current climate and security concerns since the Snowden revelations began it is impossible to guarantee any main stream encryption is secure and there is a great deal of work ongoing to review existing specifications after it […]

Security is everyone’s responsibility!

Posted by Bev Robb on April 29, 2015

wipe and flush security

Four simple words This morning I accepted a new LinkedIn connection who works for Johns Hopkins University and SANs. Aside from all of his certifications, and over a decade of security experience — he is also recognized as a strong security advocate and change agent; is self-driven, self-motivated, and result-orientated. Though he obviously holds many credentials and […]

Time to get Real on IoT

Posted by Alexander Hanff on April 29, 2015

I was reading my Twitter feed this afternoon and a member of my network posted an article about how the Internet of Things (IoT) will create a virtual world with virtual people and how wonderful this will be for society, ushering in a future where we control everything without ever having to really do anything.  […]

Why security recommendations often get ignored

Posted by Sorin Mustaca on April 9, 2015

I read very often about vulnerabilities and companies that got hacked. Many times, the reason for which they got hacked was because some recommendation issued by some smart people (read: security minded people) are ignored.   But why are they ignored? I found some articles where several explanations are given for what is called “information avoidance“. […]

Looking for the worm in the Apple Watch?

Posted by Tara Taubman-Bassirian on March 10, 2015

Apple watch has been officially presented. As a sophisticated gadget that is highly desirable. Much more aesthetic than google glasses, Kashmir Hill describes its functionalities and privacy concerns. We know that the FTC is said to have had discussions over the privacy issues of the device. we are said that Apple will not retain data […]

EU Data Centers are not safe from US Surveillance

Posted by Alexander Hanff on March 10, 2015

Over the past 12 months I have noticed an increasingly worrying trend which is developing in the global technology arena and it is one which in my mind amounts to nothing less than a deliberate attempt to mislead consumers and businesses alike on the legal powers available to US law enforcement and intelligence agencies. Late […]