Actually, there is not much to say about this. It is a blog post by CanegieMellon called A Security Comparison: Microsoft Office vs. Oracle Openoffice and just does what it says. However, I do not particularly like the security comparison of products built solely on vulnerabilities as this shows only one side of the equation…Details
This paper by the Geneva Centre for the Democratic Control of Armed Forces (DCAF) was just brought to my attention. A piece of work, which is definitely worth working through. It lays out the problem space and then does a deep dive into the different sections: Governments Legislative Bodies The Armed Forces Law Enforcement Judges…Details
An interesting article by ISACA: Six predictions for CIOs. Here they are: Prediction 1: Cloud computing is here to stay and will become business as usual. Prediction 2: Virtualization will be a catalyst that drives IT modernization. Prediction 3: IT operations become service-centric and business value-focused, rather than process-driven and reactive. Prediction 4: Risk management…Details
This is one of the rare more private posts on this blog and this time has nothing to do with security at all. Since ages one singer was always part of my wifeâ€™s and my live: Chris de Burgh. And even if it is uncool in our kidâ€™s world, they love him and his songs…Details
On March 24th, we got the certificate for the Common Criteria certification for Windows 7 and Windows Server 2008 on EAL 4+.
Here are the certified products: http://www.commoncriteriaportal.org/products/ and here you find the certificate.
A great job by the team â€“ congratulations!
Thatâ€™s really interesting:
Impressive! Kudos to MIT
A few years ago, I wanted to run an exercise with our incident response team in Switzerland. A customer, the government and me came together to develop the goals and the scenario. One of the key question we tried to answer together with the university, which we wanted to use as observers was, whether we…Details
A while ago we released the Microsoft Security Update Guide to explain how we release security updates and how you should/could work with our updates. It encompasses these themes: Get to know the security update release process Learn how to evaluate risk See how to mitigate security risks Understand how quickly you need to apply…Details
It is kind of strange: I worked with some kids on Tuesday on online safety challenges and mainly we talked about Facebook, Netlog, Twitter etc. We had a lot of very good discussions with them about how to protect your privacy Tonight we will talk to the parentâ€™s of these kids and do our best…Details
Forbes posted: The World’s Most Ethical Companies. I quote: The Ethisphere Institute, a New York City think tank, has just announced its fifth annual list of the World’s Most Ethical Companies. The selection, open to every company in every industry around the globe, gives its winners an opportunity to trumpet their do-gooding ways. It is…Details
It seems that RSA got attacked and might have lost some information. They actually took a really courageous step and went public and the Executive Chairman wrote an open letter. To quote: While at this time we are confident that the information extracted does not enable a successful direct attack on any of our RSA…Details
My manager was on the Tokyo airport, when the earthquake started. We had a chat yesterday about this â€“ he is back home in the meantime â€“ and he told me that he was very surprised that, while the phone network broke Internet still worked and he was able to call his wife immediately after…Details
FTC released their Consumer Sentinel Network Data Book for January â€“ December 2010. The interesting and scary thing is that fraud via phone is on the raise. We get more and more complaints by customers as well, telling us that they got a call from â€œMicrosoftâ€ with the ask for getting access to the PC…Details
10 years ago a browser was born. Its name was Internet Explorer 6. Now that weâ€™re in 2011, in an era of modern web standards, itâ€™s time to say goodbye. We all know that Internet Explorer is outdated and that you should move away from it to a newer browser immediately. For security, safety as…Details
Botnets are one of the toughest problems in the world of Cybercrime today. At least, this is what we thinkâ€¦ ENISA just published an interesting paper called Botnets: 10 Tough Questions, which raise questions about e.g. the size of botnets or better the way the size is estimated etc. Basically the 10 questions are: HOW…Details
You might have seen this experiment but it is absolutely astonishing. A guy called Andy from Scotland tested the upgrade path from Windows 1 through to Windows 7. 10 minutes worth investing if you want to get some nostalgic feelings: Here is the original blog post: Chain of fools : Upgrading through every version of…Details
I just read this article on Google pulling 50 applications from their Android marketplace (Google uses remote delete to remove Android apps from smartphones â€“ Update). A very good decision as these apps leverage an exploit to access user data. However, what made me think is that they removed the applications from the devices. This…Details
Do you know the feeling? You should share a large file with somebody outside your organization. The file is too big to be sent by e-mail. What can you do? Well, you might have a service by internal IT (we have one) which is not really user-friendly, hard to use and â€“ as you do…Details
It is a repeating pattern but not the less disgusting. Whenever bad things happens on the globe, the criminals are not far. This happened during hurricane Katrina, the tsunami in Indonesia, the earthquake in Haiti and now, not surprisingly in Libya as you can read in this blog post by Sophos: Violence in Libya exploited…Details