ITsecurity
twitter facebook rss

Vote for Facebook!

Posted by David Harley on May 7, 2015

As a UK citizen on the day of a general election, I’m not suffering from a lack of advice on voting. Some of my Facebook friends are urging me to vote for one party or another, others are just anxious that I should vote. Kevin, on the other hand, is anxious that none of us […]

Anti-Malware Test Cheats: the View from AMTSO

Posted by David Harley on May 7, 2015

David Harley photo

The saga of the anti-malware test cheats rolls on. If you actually find this issue of interest – and if you’re one of the anti-malware industry’s customers you  certainly should – you’ll already be aware that Qihoo was hauled over the coals by AV-Test, AV-Comparatives and Virus Bulletin for ‘apparently going out of its way to provide […]

Product test cheats: this could run and run

Posted by David Harley on May 1, 2015

David Harley photo

This is actually a follow-up to an article I wrote elsewhere on test cheating, where a security product vendor submits a version for product testing that is configured differently to the version that is actually made available to customers with the intention of having that product score higher in a comparative product test: Gaming the tests: […]

Introducing David Harley

Posted by David Harley on April 28, 2015

David Harley photo

This time it really is all about me, says David Harley.

Not a book review, but fiction that might interest you

Posted by David Harley on April 19, 2015

This is a little different to the type of article I usually contribute to this site. It’s not a book review*, though I do review security-related books from time to time (mostly but not always for Virus Bulletin: those articles are included with my other VB articles here). However, even if you’ve read my book […]

Top Facebook Stories: Your Choice?

Posted by David Harley on April 8, 2015

Facebook and its algorithms may not be as smart as FB, its paying customers, and the rest of us think. But should we take comfort from that?

Hacking the Royal Male: the Computer Misuse Act

Posted by David Harley on March 26, 2015

A look back by The Register at the Prestel hacking case that directly influenced the drafting of the Computer Misuse Act.

iToons: Attribution and the Media…

Posted by David Harley on March 26, 2015

…or geolocating spooks, Bunny bugs, and the elephant in the room… Disclaimer: while I’m an independent author and consultant, I do work closely with one of the security companies mentioned in this article. However, while the starting point for this article is a blog article it recently published, this isn’t about generating extra Likes and […]

Android exfiltration, OpenSSL, and iOS app memory handling

Posted by David Harley on March 18, 2015

[Update: details of the OpenSSL advisory released after this blog here. Note that the FREAK-related CVE-2015-0204 flagged by Intego here is reclassified as ‘severe’ and upgrades are advised: This was classified low because it was originally thought that server RSA export ciphersuite support was rare: a client was only vulnerable to a MITM attack against a server […]

50 Shades of Security Tips

Posted by David Harley on March 11, 2015

I guess we need all the advice we can get. These security tips might be helpful to you or to someone you know.