WEP of Mass Disruption

The recent controvery over the Eircom implementation of WEP security still bubbles on.  For those not in the know the problem relates to how Eircom, Ireland’s largest ISP, distributed security within the Netopia wireless routers it provides to consumers and small businesses.  Since 2005 Eircom has been shipping these routers with wireless networking enabled to support users […]

Another PDF Vulnerability?

News is circulating that another 0 Day vulnerability has been found in the Adobe Acrobat PDF file format.  It appears to affect all versions of PDF files.  Given the widespread use of PDF files and their recent use in spamming emails from the storm botnet, this could pose a serious threat to many computer systems. […]

Presentations from GSW Seminar now Available

The seminar held in Dublin during Global Security Week based on the theme “Privacy in the 21st Century” was a resounding success. We had excellent key note speakers; Tony Delaney, Assistant Commissioner, Office of the Data Protection Commissioner Caspar Bowden, Chief Privacy Advisor EMEA, Microsoft. The following are copies of the presentations in PDF format; […]

Enterprise Ireland Podcast on Security Now Available

Enterprise Ireland run a series of podcasts aimed at SMEs to help them better understand some of the issues they face with regards to deploying and managing technology.  Brian Honan was invited to take part in the latest podcast to discuss IT security and how it can be addressed by SMEs.  SMEs face the same […]

CIS Releases Benchmarks for Virtual Machines

The Center for Internet Security have released version 1.0 of their benchmarks for securing Virtual Machines.  CIS produce many excellent resources on how to secure various operating systems and devices on your network and this is another valuable guide in that series.  Anyone considering deploying Virtual Machines in their environment would do well to review […]

Global Security Week Blog

As part of Global Security Week, running from the 3rd to the 9th of September, we have created a Blog to allow you to post comments and create discussions about issues relating to “Privacy in the 21st Century“.  So if you cannot attend one of the many events organised for Global Security Week this is […]

Hacker Case Study – What Would You Do?

The Harvard Business Review has published a very interesting case study on a security breach titled “Boss, I Think Someone Stole Our Customer Data”.  The case study centres on a fictitious company that discovers client credit card data has been exposed, despite the company’s compliance with the PCI DSS Data Security Standard.  It would be interesting to see your thoughts and […]

Hackers @ Microsoft

“Welcome to a new blog from Microsoft.” is the first sentence in a new Blog launched by Microsoft called “Hackers @ Microsoft”.  This interesting new Blog is aimed at “white hat” hackers and promises to provide posts from the various hackers and security researchers employed by Microsoft.  It will be interesting to see how active this new […]

Skype outage – Who is to Blame?

Skype users recently suffered three days of service disruption with many users being effectively off air for that period. The problem appears to have started on August the 16th when users could no longer log into the service and make calls. Skype have denied the outage was due to any Denial of Service attacks or […]

Final Version of "Cyber-Security Check List" by the US CCU is now available.

The U.S. Cyber Consequences Unit, an independent research group that supplies the U.S. Department of Homeland Security with information on the consequences of cyber-attacks and evaluates the cost-effectiveness of countermeasures in place to prevent such attacks, has released the final version of its “Cyber-Security Check List”. This list is a comprehensive guide to help those […]