Category Archives: Security

The State of Computer Security

James Mickens explains the dismal state of computer security. It’s complicated.

An Effort to Fix Internet Confidentiality & Security

An effort to fix Internet confidentiality and security starts with defining the approach and who’s responsibility is it anyway. Unfortunately it is even less clear who to trust in the modern world.

WordPress Security

WordPress is one of the most popular content management systems for publishing information online. Over 20% of sites use WordPress so it is a popular target for attacks. WordPress.tv has some videos on WordPress security to help people improve the security of their sites. Notice the kid in the front row. You can never start…

Computer Administration

xkcd nails what is wrong with this picture in computer administration by visualizing what is really at risk vs. what is protected. At the very least if all your services are on your user account, especially if you have remember passwords activated for sensitive services, you should have a screen saving password that is invoked…

Flashback Trojan Mac Malware

Although Mac malware is almost non-existent, that is no reason to become complacent and think the Mac is completely immune. A trojan named Flashback with several variants that supports remote control of a Mac has infected over 600,000 Macs by exploiting a vulnerability in Java. It can be activated by inadvertently visiting certain web sites…

US Cyberwarfare Guidelines Signed

The risk factor blog has a summary of the new cyberwarfare rules being established by the US government.

There are More Cyber Attacks, with more impact, and they are getting more attention

A summary by an IEEE risk analyst shows that there is a trend of more cyber attacks with greater impact that are getting publicized including attacks against security vendors themselves. The attack on Treasury Board in Canada was notable in the extended denial of Internet service that had to be invoked in dealing with the…

SMB Security Knowing-Doing Gap

A survey of 2000 small businesses in the US and UK shows a gap between security awareness and action. Security software company AVG surveyed a sample of 2,000 SMBs in the United States and United Kingdom and found that not only do more than half have no security guidelines, but that “1 in 7 have…

Experiments Testing Airport Security Theater

Another expose on the ineffectiveness of airport security. The extra mile would be to suggest what should be done for a difficult problem of delivering effective security while not overly inconveniencing people and jeopardizing air travel business. This article at least mentions a few things that have worked and makes some suggestions. At the same…

Beckstrom’s Law

Beckstrom’s law says the value of the network is not the square of the number of nodes, it is the difference between the value of the transactions and the costs. as a formula: V = B – C’ – SI – L where V is Value B is Benefit C’ is the remaining Costs SI…