ITsecurity
twitter facebook rss

WiFi advice from a Spanish poolside bar

Posted by Robin Wood on July 21, 2014

I just got back from a holiday in Spain where I found the poolside bar had better WiFi security than a lot of companies I know. I’m thinking more of guest networks than main corporate ones here but this bar even out did some of those. Looking at why they were doing what they do, […]

The Darker Side of Jeff Bezos’ Fire Phone

Posted by Alexander Hanff on June 19, 2014

Amazon’s Jeff Bezos took to the stage this week to talk about Fire Phone – Amazon’s inaugural step into mobile devices. The world’s press and media are buzzing with activity over the device and in particular the Firefly app which can be used to identify objects and images from the camera with the immediate opportunity […]

Does DOS extortion break the security risk management rule?

Posted by Kevin on June 15, 2014

We are exhorted to bring risk management principles into the infosecurity practice. In classic risk management we can accept, mitigate or transfer risk. In infosec, this roughly translates to doing nothing, using security practices and systems for defence, or employing a third party security services provider (SSP) to provide protection for us. It is in […]

Apple’s new Swift — is it secure?

Posted by Kevin on June 13, 2014

Apple’s new programming language for the Apple iOS and OS X ecosystem, Swift, has received widespread praise and enthusiasm. It was announced earlier this month at the Apple Worldwide Developers Conference in San Francisco. Swift is typical Apple — it is by Apple for Apple, and not much else. It is elegant and fun and […]

CESG advice on securing Android in a BYOD environment

Posted by Kevin on June 10, 2014

CESG, the infosec arm of GCHQ, has released updates to its advice on the secure use of Blackberry, Android and Chrome, to cover the latest versions. The advice is aimed at public sector use of BYOD at OFFICIAL level – but it should be required reading for all businesses. It tries to square the circle […]

Security: Teksquisite style

Posted by Bev Robb on May 25, 2014

teksquisite

Let’s call this is my first official Hello World blog Post for IT Security. I am known around the web as Teksquisite. I’ve been in the security realm (in one form or another) as a (wayback) hacker, malware chaser, Microsoft Windows guru (at one time), and bad-boy-tic-on-Internet-scammers for twenty years now. I am a Southern Oregon geek […]