I don’t have a iPhone yet. I’m waiting for the version “2” which should support 3G networks. Take care if you sell your beloved iPhone to an untrusted person: Your phone (as any other PDA or mobile phone) knows everything about you: emails, calls, SMS, visited websites. When the owner
Category: Security
Google Safe Browsing
Google is never miserly in innovations. Their labs is full of nice tools for all of us. Google Safe Browsing is a tool which helps you to identify potential unsafe websites. Queries are in format: http://google.com/safebrowsing/diagnostic?site=<your url> Example: http://google.com/safebrowsing/diagnostic?site=blog.rootshell.be.
A Chronology of Data Breaches
After the Bank of Ireland, the Ulster Bank also loose notebooks with customers information. Data breach becomes more and more an issue today: As all our personal data are stored in electronic form, it’s easy for employers to take data away to work at home or attend external meetings with
nsa.gov Offline During a Few Hours
The name servers hosting the National Security Agency (aka nsa.gov) were reported unavailable during a few hours around May the 15th. How is this possible? Let start some investigations using dig. When you query a root-server and ask for the name servers (NS records) of the nsa.gov zone, you receive
Sesame Ouvre Toi!
New gadgets appeared on the access-control market: the online or “e-door locks”! New devices can be locked or unlocked from any browser (notebook, mobile phone, …), change the code or review the activity log. Read the news here.
CAPTCHA Me if You Can!
“CAPTCHA” ? What’s this? Everybody already used CAPTCHA (or “Completely Automated Turing Test To Tell Computers and Humans Apart“). You know those pictures made of deformed letters that you need to understand and type in a specific field to perform some operations like creating some accounts, authenticating, etc. Almost all
Windows Events Centralization
Events centralization is a must-have in your security policy. Using a central place where reside your logs has many advantages: Reduction of the resources usage on the source device (disk almost) No need to take care of local logs: logs contain critical data and must be secured. In case of
KUL + SANS = Safe Programmers?
The KUL is the first European university to set up a partnership with the SANS Institute. The goal is to train the students to be more focussed on security during the development of new applications. Programmers are very good in writing applications but, unfortunately, are not aware of security issues.
Users Learn More with Fun
From a end-user point of view, security is boring. It’s part of the human behaviour: if it’s too much annoying, people will not follow the rules! Even more in the IT security domain. I read the following story on the CISSP forum today. The question was: “We are doing a
Belgian NSA?
According to Datanews, A federal project in Belgium to fight online criminality will start soon. Something like a “National Security Agency“? This project exists since… 2005! The article is here. BTW, nsa.be is already registered by a ex-colleague/friend! He has maybe a good opportunity to get some €€€ 😉