I tried to convince my wife that using the Windows Phone 7 to keep track of the shopping to do is a cool idea. Well, she is not there (yet). And now I saw the latest commercial…
Probably I should convince my kids, not my wife
. . . → Read More: Connecting with your Windows Phone 7
We often talk about consumerization of IT. The advantages are huge – and so are the risks.
The key challenge is, that we increasingly started to rely on devices built for consumers to safeguard our company’s – or even worse our country’s – secrets. Consumerization is huge and makes a lot of sense from a . . . → Read More: The Risks of Consumerization of IT
A good paper: NSA – Best Practices for Keeping Your Home Network Secure
I often read two kinds of articles when it comes to ISPs and protecting privacy. In side asks for as much privacy as possible, the other one for transparency to fight cybercrime. What is our real goal? What is the role of ISPs in fighting crime? An interesting study by the OECD in comparison with an article I read today. . . . → Read More: Fighting Crime and Protecting Privacy–a Contradiction?
There are some high-level indsutry trends, which tend to be ignored by security officers. The CIO Central published an article, which I would even go further looking at the trends raised. . . . → Read More: Are You Focused On The Wrong Security Risks?
I just read this blog post by ESET laboratories: Inside a phishing attack: 35 credit cards in 5 hours.
They analyzed a very poorly designed phishing attack and found that:
The first access to the site was on January 20 at 10:01 pm (as seen in picture). The latest registered access was on the same . . . → Read More: Phishing still very effective: 35 cards in 5 hours
After the launch of different products for the consumer, businesses and in the Cloud, Steve Ballmer opened CES today in Las Vegas. You should look at it. There are a few very cool announcements Roger . . . → Read More: Exciting News from the Consumer Electronics Show in Vegas
If you use Hotmail, you should enable full session SSL in my opinion. Additionally we use SSL for additional services like Skydrive etc. However, there are some caveats. Read the blog post on that:
Hotmail security improves with full-session HTTPS encryption
I guess you do not know the problem: My kids come home from school and want an iPod – I want them to use a Zune as I am convinced that iTunes is one of the worst software I have ever seen (besides RealPlayer), I hate the lock-in into the store and the iPod user . . . → Read More: Time to sell your iPhone
I already have a problem the way tourism develops on Mount Everest (definitely understanding that some people in the region can make money and a living of it) but now you can even get fast Internet on the base camp: Peak signal: 3G cell service comes to Mount Everest…
Is this the way to go?
. . . → Read More: Internet on Mount Everest