When we procure a system or software, we often leave the default settings as setup by the vendor. That might not always be good for security. One of the most important components of any systems security work is the development of a consistent...
The Internet literally stands for interconnected networks. Essentially it is made out of individual networks. These individual networks are referred to as Autonomous Systems, abbreviated as ‘ASs’; independently managed by regional ISPs...
Wikipedia, the free encyclopedia turned on https as well as HTTP-STS or Http Strict Transport Security. This was announced on their blog. This comes as no surprise. Surely there will be a time when we look back and say how on earth we were used none...
One of the unfortunate side effect of the explosion of the information systems in recent times is the ever decreasing privacy of the individual. Privacy laws related to information systems have expended all over the world to somewhat give the...
FBI admin error leads to porn, drugs, malware and more as it loses control of website. You have to read to believe.
UEFI Secure Boot The Windows Hardware Engineering Community (WinHEC) conference in Shenzhen (China, 18-19 March 2015) has attracted a lot attention from the security community recently. It appears the UEFI Secure boot could be permanently enabled by...
In late 2014 an attack came to the attention of the security world known as the POODLE attack. POODLE stands for Padding Oracle On Downgraded Legacy Encryption. The attack underscored the vulnerabilities introduced when legacy protocols with...
After a year of big data breaches like Home Depot and Sony, and widespread security vulnerabilities in our shared software, which spawned the likes of Heartbleed and Shellshock, it’s easy to predict that cybersecurity will be a hot topic in 2015...