Tom’s Guide: 12 Computer Security Mistakes You’re Probably Making
21 September 2014 12 Computer Security Mistakes You’re Probably Making. Thanks Tom for this great Not-To Do list. My favorite: Not-To-Do-List Enjoy reading!Filed under: Opinion, Survival tips Tagged:...
View ArticleSoftware manufacturers have no sense for IT security
27 September 2014 Manufacturers of scientific software could make one’s life really hard. For ease of their own business they make detailed specifications about the software versions required for the...
View ArticleA brief introduction to Trusteer Apex Advanced Malware Protection
18 October 2014 The Trusteer approach to malware protection could be ground-breaking in the defence of zero-day exploits and phishing attacks. Trusteer analysed millions of applications exposed to the...
View ArticleSoftware manufacturers have no sense for IT security – Part II
23 October 2014 Sometimes malware protection software works too well. I found some emails with malicious executables, disguised as pdf files, in the attachment in my junk-mail folder. Unfortunately the...
View ArticleTwitter’s Digits Service Inherently Insecure?
6 November 2014 At a first glance Twitter’s Digits authentication service seems to be a major step forward to secure authentication in the web. But if you dig deeper you find a vulnerability that could...
View ArticleMicrosoft Publishes Critical Vulnerability MS14-066 in Windows SSL Library
15 November 2014 On November 11, 2014 Microsoft published in Security Bullentin MS14-066 a vulnerability in the Microsoft Secure Channel (Schannel) security package in Windows. The vulnerability is...
View ArticleSony-pocalypse is still stuck in my mind
13 December 2014 The more technical details about the Sony attack come to light, the more restless I become. Although the attacker delivered a high sophisticated piece of code, the impact of this...
View ArticleHow to mitigate Drive-by-Downloads Attacks
24 January 2014 Bad news for Adobe Flash Player users. A new critical vulnerability (CVE-2015-0311) was found in Adobe Flash Player 16.0.0.28… Successful exploitation could cause a crash and...
View ArticleAn ISO 27001 Certification is worth every dollar
15 May 2015 Some weeks ago I took part in an ISO 27001 Foundation training. The students were all IT professionals, some of them involved in certification projects. Many of them complained about the...
View ArticleSecurity falls often by the wayside if availability is a priority
16 May 2015 When we talk about information security we often forget printing. We add labels like ‘Confidential’ or ‘Top secret’ to documents to make it clear to everyone that these documents contain...
View Article