A news coming from Australia became a hot topic in lot of security forums and mailing lists today. The Australian authorities brainstormed about new ways to fight the cyber crime. One of the submitted project is forcing people to install (and activate!) an anti-virus software to be able to access
Category: People / Places
Welcome to Maltego v3!
It was discussed during the last edition of BlackHat Europe: Maltego v3 was almost ready to be released. Today is the D-day: The latest version is out! A quick reminder for those who still not know the product: “Maltego is an open source intelligence and forensics application. It will offer
Attending Security Conferences from a Social Point of View
BlackHat Europe 2010 is already over! I spend good times (who don’t!) and the huge number of canceled flights (due to the ash cloud coming from Island) did not changed my point of view. I successfully escaped from Barcelona with @corelanc0d3r and we were back in Belgium after a mix
Belgian Citizens Ready to Sacrifice Some Privacy?
From time to time, surveys reveal human behavior that are scary. On 2008, a survey revealed that woman love chocolate more than password security. I just read another one on a Belgian news website: To stay safe, the Belgian citizen is ready to sacrifice some of his privacy! (Source: rtbf.be
Grandma and her Banker!
Yesterday, I received the e-mail below, forwarded by a friend. Usually, I don’t react on such e-mails (who do not receive daily PowerPoint files, jokes or funny messages in his mailbox?). But this time, it was quite realistic. This isÂ a letter sent by a Grandma to her bank. There
Does the US Government Need a More Powerful SIEM?
The White House published a review regarding the last Christmas attempted terrorist attack. I briefly read the document and noticed some interesting facts: “The thorough analysis of large volumes of information has enabled a variety of departments and agencies to take action to prevent attacks.“ “Yet, as the amount of
Full-Disclosure is now Illegal in France
The principle of full-disclosure is to publish all the details of a discovered security problem (a software vulnerability). By doing this, the security researchers try to fight against the other principle of “Security by Obscurity”. Once a vulnerability has been found, the “normal” way of working should be to contact
Strike Can Affect Security
In these times of crisis, many companies have launched plans to optimize their costs. Unfortunately, the management decisions often directly affect the people: staff reduction, higher pressure, increase of production rates, etc. If no agreement is reached between the management and unions, strikes may affect some services. To strike is
Security Awareness Book for our Children
It is never too early to give some security recommendations! My first daughter became a fan of a book series called “Max & Lili”. Those comics books (only available in French if I’m not wrong) are written by Serge Bloch and Dominique de Saint-Mars. Each volume focuses on a specific
And What About the Human Factor?
A few days ago, an article was posted on the (ISC)2 blog about the idea of a new CBK to cover “human factors” in security? (ISC)2 means (take a deep breath) “International Information Systems Security Certification Consortium“. This is a not-for-profit organization which maintains, amongst others, the CISSP certification.The current