ITsecurity
twitter facebook rss

The Past and Future of Gamification

Posted by Josh Townsend on January 16, 2017

For many decades, a running theme in sci-fi and speculative fiction has been the idea of complete, global automation of all production. Explored over and over again in both positive and negative contexts, it seems to have taken root as a collective idea that mankind will someday become dependent on robots to perform all necessary […]

Smoking guns and glass houses in Russia Vs Clinton

Posted by Kevin on January 7, 2017

In the ongoing saga of Russia Vs Clinton, a declassified version of the US Intelligence Community assessment of Russian involvement in the 2016 US election has now been published. But if you hoped for a smoking gun, dream on. The document states very clearly that it is primarily the agencies’ conclusions; any actual proof has […]

2017 InfoSec Predictions

Posted by Martin Zinaich on January 4, 2017

As usual, we have the requisite Information Security Predictions for the coming New Year: Jeff Harris, vice president of solutions for Ixiamp, sees a ramp up in weaponization of the Internet of Things (IoT) to carry out widescale DDoS attacks in 2017 James Carder, CISO of LogRhythm, predicts that in 2017 we could be in […]

That woman May does not speak for me

Posted by Kevin on December 29, 2016

This is disgusting. I’m fairly certain that the majority of Britons who voted to leave the EU were not voting to enter a fascist state. But that’s what we’ve got thanks to that woman May — who, incidentally, has never been elected to the office of prime minister by the British people. Immigration was an […]

Webcam shows and Experian

Posted by Kevin on December 27, 2016

I came across this headline today: 200 Million Data Enrichment Records For Sale on Darknet The second paragraph reads: The person offering the files claims the data is from Experian, and is looking to get $600 for everything. However, sources at Experian said that they were made aware of this data breach last week, and […]

Agents Smith & Jones versus the Bad Guys

Posted by Kevin on December 24, 2016

A new breed of endpoint protection software has emerged over the last few years. If we simplify things – probably over-simplifying – this breed of products uses machine-learning technology to teach itself behavioural rules that can detect and block known and unknown malware in situ. This is the central theme of what is usually known […]

Anti-malware testing issues

Posted by Kevin on December 4, 2016

There is something wrong with this picture. Carl Gottlieb has founded a new online service called TestMyAV. It’s purpose is to allow you to test your own anti-virus product: “Giving you the malware, testing guides and tools you need to test antivirus products for yourself. Trust yourself, not the ‘experts’.” The site provides the malware […]

NCSC joke of the day

Posted by Kevin on December 2, 2016

I didn’t know whether to laugh or cry when I say this from the NCSC: Great hosting you today @JKingEU! We’re committed to make the UK the safest place to live and do business online, we’re glad you’re with us — NCSC UK (@ncsc) December 2, 2016 Does the NCSC really believe this? And is […]

Business Continuity Planning and quantum computing

Posted by Rob Slade on November 28, 2016

I must admit that this topic is one that really gets me excited. Yes, other aspects of security can benefit from quantum computing, and the job can be eased or made more cost-effective. But in emergency planning, you can actually save lives, and reduce suffering. As with risk analysis and management, so business impact analysis […]

Putin: Russia’s new Peter the cyber Great

Posted by Kevin on November 24, 2016

Anyone half as old as me will remember the reds under the bed. Well, they’re back; only now they’re in our computers – and fridges and cameras and light bulbs and anything else that is IP-enabled or Putin-reachable. This is the message we’re getting from western media and western governments (who pretty much control the […]