Good Washington Post Article: Microsoft welcomes scrutiny of tech industry

Interesting how the title turned out: Microsoft welcomes scrutiny of tech industry that has roiled its competition this year, says CEO Nadella. Easy for him to say. Kind of true as Microsoft was not in the focus of all the troubles this year but on the other hand, one could say that we learned our…

Details

Hackers don’t break in – they log in

We talked about this very often so far: Passwords are by far the weakest link when it comes to security today. 81% of successful attacks involve lost, breached or re-used passwords. There is another fairly current article mentioning that, even when it comes to industrial espionage in the times of COVID-19: State-linked hacking continues amid…

Details

Hacking Incidents 2009 – Interesting Data

There is a project called the web hacking incident database (WHID), which collects data and statistics on web-application related security incidents. I was just looking into their report called The Web Hacking Incident Database 2009 which has some pretty interesting statistics in. In order to judge the results and statistics of this database, we have…

Details

Hacking the Human Body

Years ago I was sitting in a healthcare event, when a researcher was talking (very excited) about the idea of having a pacemaker with Bluetooth access to fine-tune the system and read information from the sensors. Even though this might medically be a great idea, I would be fairly reluctant having such a thing in…

Details