Facebook Confidential: How the Craigslist killer manhunt exposed personal...
If the police come a-knocking, Facebook may be forced to send someone's entire account activity over. And there's a lot of it. And it might include data about you.
View ArticleCloud Service Provider Monitoring
The European Network and Information Security Agency (ENISA) has published a new guide on monitoring the security of cloud services throughout the project life-cycle. Procure Secure: A Guide to...
View ArticleSystem Hardening
System hardening is a term used frequently. But what does it exactly mean and are you doing it right? In simple terms, any system or device out of the box comes with all its bells and whistles belling...
View ArticleIgnorance in motion – how EU Laws are made
Those idiotic laws from Brussels all begin with a seemingly innocuous "consultation". That for the laws the Commission will draft to regulate the Internet of Things has just been issued. Do not be...
View ArticleI am so fired. http://goo.gl/XAzU0 [Yes, you are -Ed.]
I am so fired. http://goo.gl/XAzU0 [Yes, you are -Ed.]
View Article"No" to social media strategies. "Yes" to great content. [via theoatmeal.com/…
"No" to social media strategies. "Yes" to great content. [via theoatmeal.com/comics/facebook_likes I can haz fare yoos?]
View ArticleRun Windows 8 on iPad, anyone? by +Richi Jennings for +Computerworld #ITBW...
Run Windows 8 on iPad, anyone? by +Richi Jennings for +Computerworld #ITBW $MSFT $AAPL
View ArticleSecurity Patching for People
The updating of application and operating system software is a common phenomenon with individuals and organisations keen to reduce to zero-day threat impact that exists when a security vulnerability is...
View ArticleUpdated yesterday's post with more thoughts about how 'improved battery life'...
Updated yesterday's post with more thoughts about how 'improved battery life' can actually make an Ultrabook less expensive...
View Article"In 1988, a brand new deep sleep cell was released, compatible with all popula…"
"In 1988, a brand new deep sleep cell was released, compatible with all popular 16 bit computers. Unfortunately, it used big endian, whereas the DCPU-16 specifications called for little endian. This...
View ArticleNot Good: ICANN Leaks Sensitive Data of gTLD Applicants. #HPIO UK by +Richi...
Not Good: ICANN Leaks Sensitive Data of gTLD Applicants. #HPIO UK by +Richi Jennings for +HPUK /cc +Teresa Meek...
View ArticleLearning to cook – Bake a Trusted Cloud Part 1
Most of my friends and colleagues know that I like to cook so I will be doing a series of "recipes" in the next few weeks to address some of the key challenges based on conversations I am having with...
View Articleapple’s java update addresses flashback – and more
Apple has been getting some grief over the past week or so for their handling of the “FlashBack” trojan which infected over 500,000 Mac users worldwide. Well, yesterday, they released a new Java patch...
View ArticleOK, I’m fed up. I quit. I’m going to teach Calculus to penguins from now on. …
OK, I'm fed up. I quit. I'm going to teach Calculus to penguins from now on. #infosecquitters http://t.co/LcxXvZc9
View Articlersyslog & ElasticSearch: using dynamic index and type
Today, I have added support for dynamically taking search index and type from the message itself. It works much like dynafiles do. If dynamic mode is selected (via config params), the index name and...
View ArticleARCS 2012: dealing with systemic risk and security in complex networks
By Dr Robert Ghanea-Hercock, Chief Researcher, BT Security Research Practice This year’s workshop on Adaptive and Resilient Complex Systems (ARCS) will take place on 19 June 2012 at the Royal Society,...
View ArticleSir, Put Down the Loaded Weapon
Sensitive information is sometimes like a loaded weapon someone might randomly stumble upon in a park. For those that have some kind of training with weapons, you can probably think of a dozen things...
View ArticleWeekly News Roundup
Happy Friday to all. Welcome to another edition of our Weekly News Roundup. Dennis Fisher of Threat Post reports on a breach of the Medicaid and Child Health Insurance Plan in Utah which lead to the...
View Article