ITsecurity
twitter facebook rss

PROACTIVE use of the internet of things to detect terrorist behaviour in the public

Posted by Kevin on June 8, 2014

The hidden danger in Edward Snowden’s treasure trove of NSA documents is that it has drawn all eyes towards it — we no longer notice potential threats outside of the NSA. Take, for example, PROACTIVE (PRedictive reasOning and multi-source fusion empowering AntiCipation of attacks and Terrorist actions In Urban EnVironmEnts) — a project being funded […]

Why SMBs need to pentest their networks and websites

Posted by Kevin on May 29, 2014

In November 2013 a national bank was notified by a third party that some of its customer data was being circulated on the internet. The bank had strong perimeter defenses, had no knowledge of a breach nor could find any indication that a breach had happened. It called in a forensics team to investigate. After […]

Industry Two Faced over Privacy

Posted by Alexander Hanff on May 29, 2014

As an advocate I have spent a great deal of my time over the past six years taking part in roundtables, consultations, forums and conferences and during that time I have witnessed first hand the relentless push by “Big Data” corporations to dilute the fundamental right of privacy in order for those same corporations to […]

HSBC IT Security: No Sale

Posted by Richard Smith on May 29, 2014

By Richard Smith (Twitter: @ncsmiff) HSBC, global bank, looks as if it could do with a hearty dose of global IT security. Let us traverse some of the timeline and sketch a few conclusions. In the US, in April 2005, HSBC told 180,000 customers that their credit information might be vulnerable to thieves. It was […]

Antipodean iOS ransomware

Posted by David Harley on May 28, 2014

Wherever you live, now is the time to take advantage of Apple’s 2FA for Apple ID credentials.

Security: Teksquisite style

Posted by Bev Robb on May 25, 2014

teksquisite

Let’s call this is my first official Hello World blog Post for IT Security. I am known around the web as Teksquisite. I’ve been in the security realm (in one form or another) as a (wayback) hacker, malware chaser, Microsoft Windows guru (at one time), and bad-boy-tic-on-Internet-scammers for twenty years now. I am a Southern Oregon geek […]

Hello, ITsecurity

Posted by David Harley on May 24, 2014

Hello. I’m David Harley, a veteran independent researcher and commentator with around twenty-five years involvement in the security industry (mostly as a corporate customer, but since 2006 as a researcher within the industry), with a particular interest in malware management and technology. It’s unlikely that I’ll restrict myself to talking about that, though. I currently […]

Net neutrality: a FAQ

Posted by Kevin on May 11, 2014

What is net neutrality? Net neutrality (aka the open internet) is the principle that no one internet user should be given preferential treatment over any other internet user. From a finite bandwidth resource, if one user gets more, another user must necessarily get less. Net neutrality holds that this is discrimination that must not be […]

Care.data, pseudonymised data and the ICO

Posted by Kevin on April 29, 2014

I find the ICO’s response to Dr Neil Bhatia’s request for clarification on care.data and the Data Protection Act (DPA) to be very strange. Care.data is the name for NHS England’s program to centralise all GP patient health records together with all hospital visit records in one big data warehouse available to researchers. While originally […]

AV and the NSA: is the anti-virus industry in bed with the NSA – why do CIPAV, FinFisher and DaVinci still defeat AV?

Posted by Kevin on April 29, 2014

September 2013 is the month in which the extent of direct government hacking – as opposed to traffic surveillance – became known. 4 September – WikiLeaks releases Spy Files 3, demonstrating increasing use of third-party hacking tools, such as FinFisher. 6 September – Bruce Schneier writes in the Guardian The NSA also devotes considerable resources […]