InTheSpotLight-security

The last tagged post will appear in the box “In the spotlight” of the security newsletter

The Heartbleed Lesson: Open Source Needs Attention

Heartbleed happened because web giants thought that open source provided them with a free ride, says Wayne Rash

10 years ago

Francis Maude Launches UK CERT Cyber-Response Centre

CERT-UK is officially launched and will provide a single coordination point for handling national cyber-incidents

10 years ago

Cloud Security Needs To Get Virtual

A virtual layer inside the hypervisor could solve cloud security. But the industry isn't moving fast enough to impress Wayne…

10 years ago

Symantec Needs To Halt Its Revolving CEO Door

Symantec has ditched another CEO - but Chris Preimesberger says the company's problems are in their technology

10 years ago

The Next 25 Years: No Privacy But Hey… Flying Cars!

Surveillance might be good for us, programming languages could die, and cars may fly, says Nathaniel Borenstein, inventor of email…

10 years ago

Target: Why Blame The Victim Of The Crime?

When retailer Target was attacked, the CIO Beth Jacob had to resign. Sean Michael Kerner thinks we shouldn't be blaming…

10 years ago

Legal Protests Will Keep NSA’s Phone Record Hoard For Longer!

A legal complaint to stop the NSA storing phone records is having the opposite result, says Wayne Rash. The data…

10 years ago

The Internet Of Things Is A Security Disaster

The Internet of Things will leave systems wide open, because user companies don't manage their keys for machine-to-machine connections, says…

10 years ago

Tooling Up To Beat Malware

No malware is going to catch Wayne Rash napping. But it takes constant vigilance to keep your system clean, he…

10 years ago

No Patch Tuesday Fix for Internet Explorer?

It looks like there's no patch for Microsoft's Internet Explorer this month. Sean Michael Kerner asks if this mean IE…

10 years ago

Retailers Hit By ‘ChewBacca’ Malware

A group of cyber-criminals, possibly from the Ukraine, has used the malware to steal payment card data from dozens of…

10 years ago

Target Hack – The Net Spreads Wider

The Target hackers broke in through a third party. Sean Michael Kerner says this should change your security strategy

10 years ago

Yahoo Wins Praise For Handling Email Hack

An attack on Yahoo Mail hit the headlines, but Sean Michael Kerner praises the way it was handled

10 years ago

Don’t Blame Users For Poor Passwords

'123456' may be a crap password, but Sean Michael Kerner says the blame lies with the security systems that allow…

10 years ago

Davos: Two-Year Investigation Into Future Of The Internet Announced

Commission chair Carl Bildt says open and flexible model of the Internet increasingly under attack

10 years ago

Is Your Fridge Spreading Listeria On The Internet Of Things?

Fridges are already unhealthy places, but thanks to the Internet of Things, they are a source of online infections, says…

10 years ago

How The Crooks Hit Target

What can we learn from the Target hack? Sean Michael Kerner says we can't blame any single technology

10 years ago

After Target, Retailers Need Better Security

The Target breach exposed how weak security is at shops. Wayne Rash wants to see biometrics

10 years ago

Was FireEye’s $1bn Too High A Price For Mandiant?

Relatively-small FireEye can raise the money to buy out Mandiant, because threat detection is important, says Sean Michael Kerner

10 years ago

Cloud Databases: Another Worrying Attack Vector

Cloud databases are worrying things from a security perspective, warns Tom Brewster

10 years ago

Google And Facebook: Back Off Government, Snooping Is Our Business!

How can Facebook and Google tell the US government to limit surveillance, and then ask for more scope for snoop…

10 years ago

Do you Need RFID Protection For Your Physical Wallet?

Can thieves scan the RFID chips in your credit cards? Sean Michael Kerner has a tinfoil-lined wallet just in case

10 years ago

When Salesforce Connects Us All, Privacy Becomes Impossible

Tech companies are pursuing the hyper-connected dream, and we will follow, regardless of the massive impact it will have on…

10 years ago

DNS Vulnerability And The New Gunpowder Plotters

When groups like Anonymous go on the warpath, companies' DNS services are where they may strike first, warns Chris Marrison

10 years ago

Tech Club: ‘The Threat Landscape Is Too Big – You Have To Pick Your Battles’

Sat Birdi, CEO at vzInternet, says we need to protect authenticity of online transactions in order to stop fraud

10 years ago

‘We Can Trust GCHQ On Encryption’

Professor Alan Woodward doesn't think GCHQ or the NSA would have meddled with encryption, given they use it so much

10 years ago

Git Soothes PHP Security Fears… For Now

In a classic watering hole attack, hackers compromised a well-known, respected high-traffic Website and planted malware in a bid to…

10 years ago

CAPTCHA Is Dead. Long Live CAPTCHA!

CAPTCHA has been broken many times before. Yet even an effective new method of cracking it will do nothing to…

10 years ago

Burning Bridges: Paunch Is Erased From Forums After His Arrest

Underground crooks quickly block Blackhole creator Paunch's account following his apparent arrest, Tom Brewster finds

10 years ago

Businesses’ Easiest Targets: HR Vs. FOI Team

Spear phishers have two very nice targets to choose from. Businesses just have to accept malware will get past them,…

10 years ago