Blocking social media in companies seems to be fairly common; however I personally do not like it for different reasons. I would like you to open a debate and educate me. Tell me, why it is good or bad. Tell me, which risks you are looking at, when/if you do it.
The world got small, didn’t it? This afternoon I decided to leave home early and go to the mountains. However, I had some conference calls tonight, where we usually use Lync (successor of Communicator). So, as I do not have a fixed line there, I dialed in with my 3G card, which gave me enough…
There are some high-level indsutry trends, which tend to be ignored by security officers. The CIO Central published an article, which I would even go further looking at the trends raised.
I just read this blog post by ESET laboratories: Inside a phishing attack: 35 credit cards in 5 hours. They analyzed a very poorly designed phishing attack and found that: The first access to the site was on January 20 at 10:01 pm (as seen in picture). The latest registered access was on the same…
If you evern wondered, what our CISO thinks about security in the Cloud, you should listen to him directly.
Often, when governments look into Critical Infrastructure Protection, they start to build a CERT (Computer Emergency Response Team) or a CSIRT (Computer Security and Incident Response Team). The questions then always comes up: How do you do that? ENISA (European Network and Information Security Agency) just published a step-by-step guide on how to do this…
I blogged about my attendence at the above mentioned UNODC meeting. This is a short summary on how I preceived the meeting.
As attacks are moving up the stack, PDF becomes the number 1 exploited file type. Make sure you patch all your applications
From tomorrow on, UNDOC invited for an Open Ended Expert Group on Cybercrime in Vienna. I am really interested in seeing hoe these discussions will go. If â€“ by any chance â€“ you are there as well, please ping me and we will have a chat. Otherwise, I will see what I can blog about.…
I saw this this morning â€“ have a great weekend:
It is not really surprising that the criminals will leverage the economy of Cloud Computing for their illegal purposes. Especially activities, which consume a lot of processor power will be moved to the Cloud â€“ like any other business. Some way back, there were discussions on how to leverage GPUs to crack passwords: Graphics Cards…
The worst thing is, that there is some truth in that:
At least, this is what I see often, before I talk to customers
After the launch of different products for the consumer, businesses and in the Cloud, Steve Ballmer opened CES today in Las Vegas. You should look at it. There are a few very cool announcements
Since quite a while, I am saying that targeted attacks are the risks, which really keep me up at night.
BBC just posted a similar article: Cyber-sabotage and espionage top 2011 security fears
I think that this is a real issue and very hard to fight!