Alien Eye in the Sky 18th November 2016 |
|
Javvad Malik November 17, 2016 |
It's been a busy week indeed! Between the repercussions of the Tesco bank hacking, to AdultFriendFinder's apparent lack of a care about InfoSec, to the IP Bill, it's been somewhat dizzying. Here's the summary video, accompanying Shatners! and a suggested reading list.In This Week's VideoTesco bank hacked http://www.bbc.co.uk… Read more
Tags: video blog, news
IoT: Usability Dream or Privacy Nightmare? |
|
Javvad Malik November 16, 2016 |
Probably the best £100 I’ve ever spent was on a Nest Protect. It’s awesome. In a nutshell, it’s a Wi-Fi enabled smoke and carbon dioxide detector. My “dumb” one worked just as well but this one has a number of key advantages.Firstly, it lets me know when my batteries are running… Read more
Ransomware+: A New Shade of Evil |
|
Jim Hansen November 15, 2016 |
Ransomware has become an ever growing topic of conversation and concern in the security community during the last several years. According to the ZDNet article earlier this year — Ransomware is now the biggest cybersecurity threat — Danny Palmer asserts that ransomware has replaced the Advanced Persistent Threat (APT) as the most problematic cyber threat. He’s not wrong.… Read more
Tags: ransomware, phishing, shade
Positive Password Psychology |
|
Bob Covello Guest Blogger November 14, 2016 |
There was an interesting study conducted some years ago. In that study, young participants were asked a series of questions. The ostensible purpose of the study was to find out the answers to the questions. As with most of those cheeky study authors, the real purpose was to measure the effect of “behavioral priming”.The questions in the… Read more
Tags: password
Free and Commercial Tools to Implement the Center for Internet Security (CIS) Security Controls, Parts 18 - 20 |
|
Rich Johnson System Administrator November 10, 2016 |
This is the last part of a 'How-To' effort to compile a list of tools (free and commercial) that can help IT administrators comply with what was formerly known as the "SANS Top 20 Security Controls". It is now known as the Center for Internet Security (CIS) Security Controls. A summary of the previous posts is here:Part 1 - we looked… Read more
Tags: sans, penetration testing, cis, incident response and management

Get the latest


