From time to time, surveys reveal human behavior that are scary. On 2008, a survey revealed that woman love chocolate more than password security. I just read another one on a Belgian news website: To stay safe, the Belgian citizen is ready to sacrifice some of his privacy! (Source: rtbf.be
Category: Privacy
Security Policies Must Be Enforced!
Last week, I had a very interesting meeting with the Belgian FCCU (“Federal Computer Crime Unit“) about the security of “public” networks. The FCCU is the Federal Police division involved in all kind of computer forensics investigations. By the way, they also have their own Linux live-CD called “Lnx6N4” which
Show Me Your Browser, I’ll Tell You Who You Are!
To surf the web, you need a specific application: a browser. Today, this piece of software is delivered by default with all operating systems and becomes more and more used, even for non-related Internet stuff (Lot of applications or devices are manageable using a web interface). For some companies, the
Data Protection Day 2010
The 2010 edition of the Data Privacy Day will be held on the January, 28th. This initiative has a dedicated website: dataprivacyday2010.org. The goal is to create more awareness about your online privacy: “Data Privacy Day is an international celebration of the dignity of the individual expressed through personal information.
Belgian Transport Company Spotted at C&SAR 2009
C&SAR 2009 (“Computer & Electronics Security Applications Rendez-vous“) was organized in France a few days ago. The topic of the 2009 edition was “wireless security”, covered during three day by a large program of talks. One of the speakers was Gildas Avoine from the University of Louvain-La-Neuve. He spoke about
Is Using “Public” Transport Means Having our Information “Public”?
Beginning of this year, there was a small buzz in the Belgian security landscape about a RFID card (The BMC – “Belgian Mobility Card“) being introduced by the company in charge of the public transports in Brussels (previous article here). A few months later, what changed? Almost nothing! If the
Tracked down into the Stores
On Friday, I talked about the Freedom Not Fear event with an action day scheduled for yesterday. This initiative focuses on the retention problematic of the telecommunication data (Internet, mobile phones, …). But tracking does not only occur for digital data. Stores are another good example. Yesterday, I went with
What About Confidentiality of Data in Repair Centers?
Bad day today… My iPhone died! Yesterday it was 100% functional and today refused to boot or charge!? No reaction event after a hard-reset and a few hours of charging… This irritates me at the highest level. Well! No alternative, I went to my local dealer and explained the problem.
Security Awareness Book for our Children
It is never too early to give some security recommendations! My first daughter became a fan of a book series called “Max & Lili”. Those comics books (only available in French if I’m not wrong) are written by Serge Bloch and Dominique de Saint-Mars. Each volume focuses on a specific
This Message Will Self-destroy in 30″!
“Cloud computing”! This is a hot topic in IT security for a while. I won’t explain why security is so importing within the cloud. To have a good overview, I recommend to follow Craig Balding’s blog. For sure, you already have personal data stored on the web. You use webmail