AV Test: Two thirds of Android Malware scanners are unsuitable for use
The summary of AV Test’s March 2012 Malware Protection for Android Tests includes the following: “Close to two thirds of these scanners are not yet suitable for use as reliable products and identify...
View ArticleOn Elcomsoft and their criticism of iOS Password Apps
Excellent article from Glenn Fleishman at TidBITS Safe Computing on how Elcomsoft Criticism of iOS Password Apps is Overblown. The core point I took from the article is that there is a four factor...
View ArticleOn Lookout Ad Network Detector
In my day job I sell security products, including Lookout Mobile Security, to Telstra customers. Here’s a post I wrote about the Ad Network Detector Lookout have just released to help users be certain...
View ArticleSecurity threats delivered at the “Watering Hole”– RSA
RSA, the manufacturer of ‘Security, Compliance and Risk-Management solutions have discovered a new method of delivering what’s known as an Advanced Persistent Threat: methodology relies on...
View ArticleThe Simple Passphrase Conundrum
…companies who hold the “keys to the castles,” can help by developing technologies that empower us to apply increasingly strong protections while also minimizing the day-to-day hassles of a complicated...
View ArticleA Shark Net for the Insecure
You couldn’t help but read Andrew Auernheimer’s Statement Of Responsibility for his crime of breaking into unsecured API’s on the AT&T website – the iPad Hack – and wonder in what world do we think...
View ArticleChrome’s insane password security strategy
By using words like ‘confidential information’ and ‘stored in your keychain’, OSX describes the state of your saved password’s current security. It’s the very security Chrome is about to bypass, by...
View ArticleIBM buys Trusteer, gets a lot more than Anti-Virus
What does it say about News Limited’s Business Spectator when they pigeon hole Trusteer as an "anti-virus" company? Some simple journalism, including other sources for the news about IBM’s purchase of...
View ArticlePreventing the threat
In his 11 sure signs you’ve been hacked post, Roger Grimes writes Most malicious hacking originates from one of three vectors: unpatched software, running Trojan horse programs, and responding to fake...
View ArticleThis Mess We’re In
Teaching Children is Easy Hong Kong has apparently been working hard at its efforts to integrate its multi-racial society a bit closer. This satirical jab from Hong Wrong on the statelet’s (sorry Self...
View Article
More Pages to Explore .....