Remember There is No Such Thing as 100% Security

A client recently told me that they could not replace a laptop they had installed in a public reception area as the key to the Kensington lock used to secure the laptop was lost.  I showed them the following two videos to demonstrate that these locks could be bypassed. and It was interesting to note […]

Clickjack Proof Of Concept

Details of the much talked about Clickjack exploit are now available on Jerermiah Grossman’s blog, RSnakes blog and Adobe’s website.  Jeremiah and RSnakewere meant to demonstrate clickjack at a recent conference but decided not to in order to give the vendors time to address the problem.  Given that this exploit can be used to remotely use […]

Blob Security

Interesting article over at Network World explaining why security professionals need to change the way we talk to business people, and the public, in order for them to become more aware of the latest security threats.  What is interesting is the author uses the 1958 movie “The Blob” as a background to the piece.

Data of 17 Million Mobile Phone Users Exposed

It appears that a security breach at Deutche Telekom in 2006 exposed personal details of over 17 million customers of its mobile phone division, T-Mobile.  The company claims that no credit card or financial details were exposed but that information such as email addresses as well as mobile numbers and addresses was exposed. The company […]

Responsible Disclosure

The SiliconRepublic.com ran a story on Friday that highlighted a security defect on the Department of Agriculture’s website.  Apparently the reported vulnerability enables anyone to browse details of any farmer who has received money from the EU Common Agriculture Policy payments scheme. The article claims that the Department of Agriculture were not aware of the […]

Once More Into The Breach

It has been an interesting week to say the least with regards to information security breaches in Ireland.  First we heard of the responses to Ruairi Quinn’s question as to how many portable devices belonging to government departments have gone missing this year.  So far over 45 devices have been lost.  Damien Mulley has a breakdown […]

Wireless Insecurity

One of my favourite programs is “The Real Hustle” from the BBC.  This program demonstrates the techniques and tricks that criminals use to swindle or steal people’s money.  The team ran a number of technology related scams and are quite educational and entertaining;  The first shows how easy it is for a criminal to break […]

Estonian Government Releases Cyber Strategy Paper

The Estonian Government has released a strategy paperon enhancing cyber security.  This is an interesting read as we can all learn from the lessons of the cyber attacks against Estonia last year.  The report makes for interesting reading and yet it is still sad to see that governments and many organisations only take computer security […]

Brian Honan to Chair Roundtable Discussion on Security with Bruce Schneier

I have been given the honour to chair an upcoming roundtable discussion hosted by the Institute of International and European Affairs on risk and security at which  Bruce Schneier, Chief Security Technology Officer of BT Group, will address.  Having been a subscriber to Bruce Schneir’s Cryptogram newsletter, an avid reader of his Blog, a reader […]