Brexit sorted
This Brexit thing worries a lot of people. Take Angela Merkel. You see, the German economy works best when there’s a strong UK economy. Well, no. Forget the UK. When there’s a strong England economy....
View ArticleIP Bill, Brexit and Trump create perfect storm of autocracy
Writing in the New Scientist today, Ray Corrigan (a senior lecturer in the science, technology, engineering and mathematics faculty at the Open University) describes the perfect storm for loss of...
View ArticlePutin: Russia’s new Peter the cyber Great
Anyone half as old as me will remember the reds under the bed. Well, they’re back; only now they’re in our computers – and fridges and cameras and light bulbs and anything else that is IP-enabled or...
View ArticleSupport Scams and Diagnostic Services
Sometimes the borderline between out-and-out support scams and sub-optimal diagnostic services is too blurry for comfort. The post Support Scams and Diagnostic Services appeared first on ITsecurity.
View ArticleBusiness Continuity Planning and quantum computing
I must admit that this topic is one that really gets me excited. Yes, other aspects of security can benefit from quantum computing, and the job can be eased or made more cost-effective. But in...
View ArticleNCSC joke of the day
I didn’t know whether to laugh or cry when I say this from the NCSC: Great hosting you today @JKingEU! We’re committed to make the UK the safest place to live and do business online, we’re glad you’re...
View ArticleAnti-malware testing issues
There is something wrong with this picture. Carl Gottlieb has founded a new online service called TestMyAV. It’s purpose is to allow you to test your own anti-virus product: “Giving you the malware,...
View ArticleAgents Smith & Jones versus the Bad Guys
A new breed of endpoint protection software has emerged over the last few years. If we simplify things – probably over-simplifying – this breed of products uses machine-learning technology to teach...
View ArticleWebcam shows and Experian
I came across this headline today: 200 Million Data Enrichment Records For Sale on Darknet The second paragraph reads: The person offering the files claims the data is from Experian, and is looking to...
View ArticleThat woman May does not speak for me
This is disgusting. I’m fairly certain that the majority of Britons who voted to leave the EU were not voting to enter a fascist state. But that’s what we’ve got thanks to that woman May — who,...
View ArticleNCSC and Twitter
Hmm… Not sure what to say about this. Still, it’s good of them to let us know. Share This:The post NCSC and Twitter appeared first on ITsecurity.
View Article2017 InfoSec Predictions
As usual, we have the requisite Information Security Predictions for the coming New Year: Jeff Harris, vice president of solutions for Ixiamp, sees a ramp up in weaponization of the Internet of Things...
View ArticleSmoking guns and glass houses in Russia Vs Clinton
In the ongoing saga of Russia Vs Clinton, a declassified version of the US Intelligence Community assessment of Russian involvement in the 2016 US election has now been published. But if you hoped for...
View ArticleThe Past and Future of Gamification
For many decades, a running theme in sci-fi and speculative fiction has been the idea of complete, global automation of all production. Explored over and over again in both positive and negative...
View ArticleWindows 10 profile problems
I run Windows 10 Pro. I’m really getting to hate it. Latest issue: not being able to get the profile (that is, the local account or desktop) up and running. A couple of weeks ago, I couldn’t log on to...
View ArticleKey Card Ransomware: News versus FUD
On the 28th January 2017, a news site reported that Hotel ransomed by hackers as guests locked out of rooms. The story initially claimed that a ransomware gang had been able to compromise systems in...
View ArticleThe Nintendo Switch and the Future of Console Gaming
Gaming’s first big event of 2017 will be the launch of the Nintendo Switch at the beginning of March. The first major home console release since the Xbox One in 2013, the market performance of the...
View ArticleHow vendors empower weak security
I wrote about this before in a post called “Big Things and Small Things”. I documented how two very large companies failed to support Information Security in a corporate environment with even a basic...
View ArticleThe Watson problem
There is a problem with Watson. Don’t get me wrong; I love Watson, or at least the idea of Watson. For such an incredibly complex operation the concept is clean and simple. You take a great big...
View ArticleSocial Engineering v. Malware: Remembering VBS/Loveletter
VBS/Loveletter demonstrated that sometimes the quality of malcode doesn't matter if the social engineering hits the spot.The post Social Engineering v. Malware: Remembering VBS/Loveletter appeared...
View Article