Monthly Archives: February 2011
Recently the Canadian government was hacked. Guest blogger Rami Jabara expresses his dismay and walks us through the technologies that, if properly deployed, could have prevented this embarrassing incident.
Computer technology is becoming more sophisticated all the time, but it seems that their users are still neanderthals when it comes to being duped by simple social engineering tricks like the promise of naked pictures.
Michael Argast and Chet talk about Westboro Church vs. Anonymous, the Canadian Government getting hacked, the latest MS and Java vulnerabilities and more
Anonymous supporters have launched a DDoS attack against Westboro Baptist Church, the group famous for picketing military funerals with anti-gay signs.
It's worth everybody remembering that phishing gangs and cybercriminals don't just target users of multinational global brands such as eBay, PayPal and iTunes.
The third and final part of our OS X security series covers system security. Learn best practices for the Mac OS X firewall, Safari and how to control services.
Researchers at last weeks Usenix FaST 11 conference presented a paper showing how difficult it can be to erase SSDs. We have summarized their results here and provide best practices on protecting your data if you are using SSDs.
Duck is now on his way back from the RSA conference in San Francisco - from where he can tell you that the WiFi Terms and Conditions at the airport are still as onerous as they were last year - with an amusing fifth anecdote to add to his Travellers Beware series.
Chester Wisniewski and Paul Ducklin are back on the air, having just finished up their stint at the RSA 2011 Conference.
Whilst there, they accepted a Most Educational Security Blog award on behalf of the whole Naked Security team.
The UK government has today published a report into the cost of cybercrime, concluding that the overall cost to the UK economy from cybercrime is £27bn per year.
But can we trust the numbers? And what needs to happen before we can properly measure our success fighting the menace of cybercrime?
Is it HongTouTou, Adrd or Geinimi? One thing is clear - new malware for Android smartphones is grabbing users' attention.
Make sure that you are careful about the applications you install on your Android device.
The great and the good of the information security industry have squeezed into their tuxedos and party frocks for a glittering gala dinner and awards ceremony in San Francisco, organised by the folks at SC Magazine.
The Anonymous attack on HBGary Federal should send a shiver down the spine of any IT administrator responsible for securing their own company.
Phishing emails target Steam video game players.
Will you be too trigger-happy next time you receive an email claiming to come from Steam?