Twitter Weekly Updates for 2012-04-09
Modern Spies on BBC 2 right now. Engaging educational and covering cyber / China – go get it on i player # BBC Modern spies – GCHQ is full of geeks and proud of it. enlightening stuff # well there...
View ArticleData Growth is Bringing Security and Ops Together
There was an interesting article posted last month in NetworkWorld by Jeff Vance applying the concept of hoarding to electronic data. My favorite quote (altered slightly) from the article is borrowed...
View ArticleIntroduction to Microsoft PowerShell – Working with PSDrives and Items
PowerShell provides many ways to work with files and with other sorts of structured data it treats as files. Typically as shown before we can use the same commands as in cmd.exe but they parameters...
View ArticleThanks for Your Patience
Many thanks for your patience during our move to the new host. Our typical posting time-line should be back in place tomorrow. Please update your RSS readers to reflect our new syndicaiton address...
View ArticleTED: McRae’s "How Can Technology Transform The Human Body"
HTML5 HTML5 480p MP4360p MP4270p MP4FlashTEDQT Player
View ArticleBonkersWorld: Endings, Choose Your Own
via the comic genius of Manu Cornet at BonkersWorld.com
View ArticleHil’s Victuals
via the sarcastic genius of Texts From Hillary at textsfromhillary.tumblr.com
View ArticleInfoSec Daily Podcast Episode 641
Episode 641 - Strange Wifi, Medicaid Hack, #OpTrialatHome, China Admits, and College Spies
View ArticleThe Sustainability of Information Security
It all started like this ... Colleague: Are we an industry built on outliers? Built on people who are smarter than the statistical norm/average?Colleague: And if that's true, can we continue to...
View ArticleHave you seen this parrot?
An escaped parrot teaches us all a couple of useful security lessons. Find out how...
View ArticleSubject Access Requests and Disproportionate Effort
What functionality do your applications include to support subject access requests? During operation and after decommissioning? The concept of disproportionate effort in section 8(2) of the Act...
View ArticleWhy Do Hackers Want Facebook Data, Part I of II
Late in 2011, Max Schrems asked Facebook for a profile the social networking company assembled based on his posts, likes and friends. Max received a 1200 page PDF file with lots of personal details....
View ArticleISO 27001 control objectives – Why are they important?
SharePeter Drucker (one of the most influential thinkers on the subject of management theory) said “What gets measured gets managed”. The same goes for information security – if you don’t know how...
View ArticleZeus Targets Cloud Payroll Service to Siphon Money from Enterprises
With critical business services migrating to the cloud, service providers have become a prime target for cybercriminals. In the latest example of financial malware targeting enterprises, we have...
View ArticleAre Macs safer than PCs?
Apple have traditionally marketed their systems as being more secure than those running Microsoft Windows, but just how true is that?
View ArticleOnLive is back on; tablet cloud Windows-as-a-service legal again. Virtualized...
OnLive is back on; tablet cloud Windows-as-a-service legal again. Virtualized desktop service OnLive seems to have resolved its licensing differences with Microsoft (NASDAQ:MSFT). Amazingly, a few...
View ArticleDo We Have a Duty to Run Anti-Virus Software?
If you have children under the age of 11, you are probably already familiar with the continual trips to inoculation clinics for things like Polio, Tetanus, Hepatitis, Measles, Mumps and so on. Whilst...
View ArticlePrivacy concerns after Instagram’s acquisition by Facebook
Some Instagram users are upset about the acquisition by Facebook - but are they right to complain about what happens to their uploaded photographs?
View ArticleMac Malware
For quite some time, techies have understood that Macs were not invulnerable to malware, and the idea that there was not much Mac malware was a natural consequence of relative market opportunity for...
View Article