Eye of the Tiger
Tiger Raids were once the tool of high end criminal gangs looking to steal large sums of money from organisations with enough security and defences to make a direct attack highly risky to the criminal gang. Instead, the gang builds up a profile of key staff within the target organisation and then targets a staff […]
Safer Internet Day Approaches
February the 6th sees this year’s Safer Internet Day which is organised by Insafe, a network of 23 nodes in 21 countries funded through the EU Safer Internet Programme, and is aimed at children and younger Internet users. Each year a series of events are run to promote safer use of the internet and draw younger […]
Reader and Weep
Ah yes, another year begins and yet again we are faced with a potentially far reaching vulnerability to deal with as we shake off the excesses of the holiday season, remember the .WMF vulnerability from last year? There is a lot of activity on various lists regarding a cross-site scripting vulnerability that has been discovered […]
Home Support at Christmas
As Christmas is rapidly looming, those of us of a technical bent will be facing the holiday season with a certain amount on trepidation as we wait for a relative or friend to utter the words “You work in IT don’t you? Can you have a quick look at the PC I got at Christmas”. […]
December Issue of Security Watch Newsletter Available
The December 2006 edition of our sister publication, the Security Watch Newsletter, is now available online. For those of you who do not subscribe to our newsletter, you may find it a useful read as we highlight issues and stories that may not be applicable to our Blog. Each month we also publish a free whitepaper, […]
Terrorist Radicalisation & Recruitment on the Internet
The Institute for European Studies has launched a Blog to support its research into the topic of Terrorist Radicalisation & Recruitment on the Internet. The purpose of the project is to identify what would be involved in providing some means of preventing European citizens from accessing terrorist radical and recruiting content on the web. This […]
Tracking Santa
Formed in 1958 under a bi-national agreement between the United States and Canada, NORAD (North American Aerospace Defence Command) is a military organisation responsible for the air-defence of North America. NORAD provides warning of missile and air attacks against either Canada or the United States. Using sophisticated systems NORAD track all objects flying across North […]
Greek Authorities Fine Vodafone €76 Million for Network Breach
During the 2004 Greek Olympics persons unknown broke into the Vodafone network and installed surveillance software to monitor the calls of over 100 people including the mobile phone of the Greek Prime Minister. Greek authorities have not been able to find who was responsible for the breach. One of the reasons given is that Vodafone […]
Microsoft Confirm Another 0 Day vulnerability in Word
Microsoft has confirmed that a new 0 day vulnerability has been discovered in their Microsoft Word product. Versions Word 2000, Word 2002, Word 2003 and the Word Viewer 2003 are affected. Microsoft Word 2007 is not affected by the vulnerability. For more information see the following Microsoft Security Advisory. This vulnerability follows on from another […]
CERT Podcasts
Thanks to Gary Hinson’s excellent NoticeBored Blog I was made aware of the podcasts CERT/CC are producing entitled CERT Podcast Series: Security for Business Leaders. Some very useful information available that will help pass the time while sitting on the M50.