ITsecurity
twitter facebook rss

LinkedIn used to be my favourite social network…

Posted by Kevin on September 1, 2014

…but it’s not anymore. It’s getting too pushy. Sending me in-application alerts when people I don’t really know write posts on subjects I’m not really interested in; and continually recommending articles in prime position at the top of the page when they just get in my way. Take the above as an example. LinkedIn first […]

Software Development Process – courtesy of 9GAG

Posted by Kevin on August 27, 2014

This is the most accurate description I’ve come across. The fairies, from left to right, are the Wicked Witch, the Tooth Fairy, Tinker Bell, and Fairy Hedgehog. You will notice that the Security Fairy hasn’t turned up yet. Always last to be invited to the ball – way after the Wicked Witch arrives – the […]

Securing a laptop is harder than you think

Posted by Kevin on August 14, 2014

There’s a superb e-book called Information Security for Journalists written by Silkie Carlo (a London-based journalist, activist, and a campaigner at the Courage Foundation) and Arjen Kamphuis (co-founder and Chief Technology Officer of Gendo). It has a foreword by Gavin MacFadyen, Director of the Centre for Investigative Journalism: This handbook is a very important practical […]

Cameron’s Master Plan to bypass democratic process

Posted by Kevin on July 25, 2014

There is little difference between the extreme left and the extreme right of democratic thought. The extreme left seeks to re-engineer society into its own image. The extreme right seeks to bend society to its will. The main difference is in the nomenclature: but whether they are termed marxists or fascists, the end result is […]

What’s wrong with writing passwords down?

Posted by Kevin on July 21, 2014

A new research paper from Microsoft Research (Redmond) and Carleton University (Canada) takes a scientific look at the problem of maintaining multiple strong passwords. The issue is simple and well-known. Users now have so many online accounts that it is impossible to remember strong individual passwords for all of them. The result is that many […]

Cameron is destroying anything worth defending – the terrorists have already won

Posted by Kevin on July 10, 2014

Anybody who knows anything about how the intelligence services lead the British government by the nose will not be surprised: Britain said on Thursday it would rush through emergency legislation to force telecoms firms to retain customer data for a year, calling the move vital for national security following a decision by Europe’s top court. […]

Never tell an AV guy that he’s unnecessary

Posted by Kevin on July 8, 2014

If there is one thing I have learnt in years of security, it is this: never tell an AV guy that he is not necessary. But that is exactly what Adrian Ludwig, the lead engineer for Android security at Google, seems to have told the Sydney Morning Herald: The majority of Android smartphone and tablet […]

The US economy is far more fragile and endangered than you might think

Posted by Kevin on July 7, 2014

In the modern world, the new weapons of war are no longer just guns and munitions, but money and intel. Intelligence is like any other weapon of war – if you have more and of better quality than the enemy, you will win. That requires acquiring knowledge of the enemy while preventing the enemy from […]

Google, the right to be forgotten, and dogs’ breakfasts

Posted by Kevin on July 5, 2014

Google is making a complete dog’s breakfast over the European Court of Justice (ECJ) ruling that confirmed it is bound by European data protection laws. You may recall that in May the ECJ ruled that …the Court holds that the operator is, in certain circumstances, obliged to remove links to web pages that are published […]

A glimmer of hope for the automatic removal of PUPs

Posted by Kevin on June 19, 2014

A PUP is a potentially unwanted program. They are usually installed by deceit and are designed to make money for the author. This could be by displaying adverts, redirecting your browser to different web sites, or invoking premium rate phone calls. But whether they are actually illegal is a fine point – although deceit to […]