InTheSpotLight-security

The last tagged post will appear in the box “In the spotlight” of the security newsletter

The Heartbleed Lesson: Open Source Needs Attention

Heartbleed happened because web giants thought that open source provided them with a free ride, says Wayne Rash

8 years ago

Francis Maude Launches UK CERT Cyber-Response Centre

CERT-UK is officially launched and will provide a single coordination point for handling national cyber-incidents

8 years ago

Cloud Security Needs To Get Virtual

A virtual layer inside the hypervisor could solve cloud security. But the industry isn't moving fast enough to impress Wayne…

8 years ago

Symantec Needs To Halt Its Revolving CEO Door

Symantec has ditched another CEO - but Chris Preimesberger says the company's problems are in their technology

8 years ago

The Next 25 Years: No Privacy But Hey… Flying Cars!

Surveillance might be good for us, programming languages could die, and cars may fly, says Nathaniel Borenstein, inventor of email…

8 years ago

Target: Why Blame The Victim Of The Crime?

When retailer Target was attacked, the CIO Beth Jacob had to resign. Sean Michael Kerner thinks we shouldn't be blaming…

8 years ago

Legal Protests Will Keep NSA’s Phone Record Hoard For Longer!

A legal complaint to stop the NSA storing phone records is having the opposite result, says Wayne Rash. The data…

8 years ago

The Internet Of Things Is A Security Disaster

The Internet of Things will leave systems wide open, because user companies don't manage their keys for machine-to-machine connections, says…

8 years ago

Tooling Up To Beat Malware

No malware is going to catch Wayne Rash napping. But it takes constant vigilance to keep your system clean, he…

8 years ago

No Patch Tuesday Fix for Internet Explorer?

It looks like there's no patch for Microsoft's Internet Explorer this month. Sean Michael Kerner asks if this mean IE…

8 years ago

Retailers Hit By ‘ChewBacca’ Malware

A group of cyber-criminals, possibly from the Ukraine, has used the malware to steal payment card data from dozens of…

8 years ago

Target Hack – The Net Spreads Wider

The Target hackers broke in through a third party. Sean Michael Kerner says this should change your security strategy

8 years ago

Yahoo Wins Praise For Handling Email Hack

An attack on Yahoo Mail hit the headlines, but Sean Michael Kerner praises the way it was handled

8 years ago

Don’t Blame Users For Poor Passwords

'123456' may be a crap password, but Sean Michael Kerner says the blame lies with the security systems that allow…

8 years ago

Davos: Two-Year Investigation Into Future Of The Internet Announced

Commission chair Carl Bildt says open and flexible model of the Internet increasingly under attack

8 years ago

Is Your Fridge Spreading Listeria On The Internet Of Things?

Fridges are already unhealthy places, but thanks to the Internet of Things, they are a source of online infections, says…

8 years ago

How The Crooks Hit Target

What can we learn from the Target hack? Sean Michael Kerner says we can't blame any single technology

8 years ago

After Target, Retailers Need Better Security

The Target breach exposed how weak security is at shops. Wayne Rash wants to see biometrics

8 years ago

Was FireEye’s $1bn Too High A Price For Mandiant?

Relatively-small FireEye can raise the money to buy out Mandiant, because threat detection is important, says Sean Michael Kerner

8 years ago

Cloud Databases: Another Worrying Attack Vector

Cloud databases are worrying things from a security perspective, warns Tom Brewster

8 years ago

Google And Facebook: Back Off Government, Snooping Is Our Business!

How can Facebook and Google tell the US government to limit surveillance, and then ask for more scope for snoop…

8 years ago

Do you Need RFID Protection For Your Physical Wallet?

Can thieves scan the RFID chips in your credit cards? Sean Michael Kerner has a tinfoil-lined wallet just in case

8 years ago

When Salesforce Connects Us All, Privacy Becomes Impossible

Tech companies are pursuing the hyper-connected dream, and we will follow, regardless of the massive impact it will have on…

9 years ago

DNS Vulnerability And The New Gunpowder Plotters

When groups like Anonymous go on the warpath, companies' DNS services are where they may strike first, warns Chris Marrison

9 years ago

Tech Club: ‘The Threat Landscape Is Too Big – You Have To Pick Your Battles’

Sat Birdi, CEO at vzInternet, says we need to protect authenticity of online transactions in order to stop fraud

9 years ago

‘We Can Trust GCHQ On Encryption’

Professor Alan Woodward doesn't think GCHQ or the NSA would have meddled with encryption, given they use it so much

9 years ago

Git Soothes PHP Security Fears… For Now

In a classic watering hole attack, hackers compromised a well-known, respected high-traffic Website and planted malware in a bid to…

9 years ago

CAPTCHA Is Dead. Long Live CAPTCHA!

CAPTCHA has been broken many times before. Yet even an effective new method of cracking it will do nothing to…

9 years ago

Burning Bridges: Paunch Is Erased From Forums After His Arrest

Underground crooks quickly block Blackhole creator Paunch's account following his apparent arrest, Tom Brewster finds

9 years ago

Businesses’ Easiest Targets: HR Vs. FOI Team

Spear phishers have two very nice targets to choose from. Businesses just have to accept malware will get past them,…

9 years ago