Quantcast
Channel: Making Hay » Security
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

AV Test: Two thirds of Android Malware scanners are unsuitable for use

The summary of AV Test’s March 2012 Malware Protection for Android Tests includes the following: “Close to two thirds of these scanners are not yet suitable for use as reliable products and identify...

View Article



Image may be NSFW.
Clik here to view.

On Elcomsoft and their criticism of iOS Password Apps

Excellent article from Glenn Fleishman at TidBITS Safe Computing on how Elcomsoft Criticism of iOS Password Apps is Overblown. The core point I took from the article is that there is a four factor...

View Article

Image may be NSFW.
Clik here to view.

On Lookout Ad Network Detector

In my day job I sell security products, including Lookout Mobile Security, to Telstra customers. Here’s a post I wrote about the Ad Network Detector Lookout have just released to help users be certain...

View Article

Image may be NSFW.
Clik here to view.

Security threats delivered at the “Watering Hole”– RSA

RSA, the manufacturer of ‘Security, Compliance and Risk-Management solutions have discovered a new method of delivering what’s known as an Advanced Persistent Threat: methodology relies on...

View Article

Image may be NSFW.
Clik here to view.

The Simple Passphrase Conundrum

…companies who hold the “keys to the castles,” can help by developing technologies that empower us to apply increasingly strong protections while also minimizing the day-to-day hassles of a complicated...

View Article


Image may be NSFW.
Clik here to view.

A Shark Net for the Insecure

You couldn’t help but read Andrew Auernheimer’s Statement Of Responsibility for his crime of breaking into unsecured API’s on the AT&T website – the iPad Hack – and wonder in what world do we think...

View Article

Image may be NSFW.
Clik here to view.

Chrome’s insane password security strategy

By using words like ‘confidential information’ and ‘stored in your keychain’, OSX describes the state of your saved password’s current security. It’s the very security Chrome is about to bypass, by...

View Article

Image may be NSFW.
Clik here to view.

IBM buys Trusteer, gets a lot more than Anti-Virus

What does it say about News Limited’s Business Spectator when they pigeon hole Trusteer as an "anti-virus" company? Some simple journalism, including other sources for the news about IBM’s purchase of...

View Article


Image may be NSFW.
Clik here to view.

Preventing the threat

In his 11 sure signs you’ve been hacked post, Roger Grimes writes Most malicious hacking originates from one of three vectors: unpatched software, running Trojan horse programs, and responding to fake...

View Article


Image may be NSFW.
Clik here to view.

This Mess We’re In

Teaching Children is Easy Hong Kong has apparently been working hard at its efforts to integrate its multi-racial society a bit closer. This satirical jab from Hong Wrong on the statelet’s (sorry Self...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images