The issue of a trusted insider betraying a trust either maliciously or for commercial gain is a problem we often discussed at university and never really came up with an answer. You need trusted people for any business to operate – you should use the “principle of least privilege” to …
I do not use the Apple iOS VPN and here’s why… Written whilst on holiday using a VPN.
When I use a VPN, I do it because I want my communications across the internet to be private. Apple iOS VPN is not private enough: Two years on, Apple iOS VPNs still leak IP addresses • The Register I always use a VPN when I suspect the internet connection …
Because It’s Friday – Janet Jackson cyber threat!
In a week where I can quote Stan Lee, in the context of cyber security, here is one of the weirdest technology stories we have featured in our “Because It’s Friday” segment. Janet Jackson music video given CVE for crashing laptops • The Register The threat has a CVE listing …
Continue reading “Because It’s Friday – Janet Jackson cyber threat!”
Your security keys are supposed to be secret – don’t copy and paste them from the internet
Here is another car security story, but this time it appears it is laziness or carelessness: Software dev cracks Hyundai encryption with Google search • The Register
Is your email server blacklisted? The Peter Parker Principle.
…with great power there must also come — great responsibility! Stan Lee – Amazing Fantasy #15 (1962) A company with little accountability can blacklist your organisation’s email servers and not tell you why – and your hosting company pays for the privilege: Sp*mh**s warns email hygiene has worsened • The …
Continue reading “Is your email server blacklisted? The Peter Parker Principle.”