I published the following diary on isc.sans.org: “How was your stay at the Hotel La Playa?“. I made the following demo for a customer in the scope of a security awareness event. When speaking to non-technical people, it’s always difficult to demonstrate how easily attackers can abuse of their devices and
Tag: Awareness
When Security Makes Users Asleep!
It’s a fact, in industries or on building sites, professional people make mistakes or, worse, get injured. Why? Because their attention is reduced at a certain point. When you’re doing the same job all day long, you get tired and lack of concentration. The same can apply in information security! For a long
Password – (noun) A Reminder for Your Dog’s Name
Aaaaah… Passwords! Why write a blog article about them. Everything has alreay been said about passwords. Everybody hates them because they are hard to remember, because we should change it regularly, because we have way too much of them. They are often present in security awareness campaign (see the article
Twitter Used As Security Awareness Media: “FiveWordSecurityHorrors”
Yesterday a new trend started on Twitter with the hashtag “FiveWordTechHorrorsâ€. I don’t know exactly who started it and why but it became quickly relayed and populated by many people working in IT. Everybody started to report some horror stories of ideas in all IT domains (security, development, hardware, software,
Why the Belgian Cyber Security Guide Must Be Extended? Example with MySQL!
A few days ago, I attended an event organized by the Chamber of Commerce in Belgium (ICC Belgium) and the Federation of Enterprises (FEB) to announce with great ceremony the release of the first Belgian Cyber Security Guide. Honestly, this is a great initiative! In the audience, many many infosec professionals were
Security Awareness Through Proverbs
In big organizations with lot of employees, not all people have the right attitude or knowledge to use information assets in a good safe way. This is not a complain, just a fact. To educate these people, a security awareness program must be implemented to make them aware of the
Wall Of Shame: Pros & Cons
A “Wall of Shame” or “Wall of Sheep” is a real-time demonstration application which searches for non secured (read: sent in clear text) login/passwords sent through a network. One of the well-know wall of sheep is the one operated every year during the Defcon conference in Las Vegas. A few