Security

Nest thermostat vulnerable because of “developer mode”

The Nest thermostat is a smart home automation device that aims to learn about your heating and cooling habits to help optimize your scheduling and power usage. Debuted in 2010, the smart NEST devices have been proved a huge success that Google spent $3.2B to acquire the whole company. However, the smartness of the thermostat […]

improve-your-security

“Improve your Security” eBooks bundle

Hello dear readers, I finally found the time to optimize a bit the reading experience of the book. In order to allow everyone to quickly find what they are interested in, I split the book in topics and create individual… Read more → from Improve Your Security http://ift.tt/1kD4gTD via improve-your-security.org Get the free eBook from […]

CSSLP

Quoted in the (ISC)2 newsletter

    EMEA members are also sharing their expertise on the (ISC)² blog. Why we continue to fail on Cyber Security is the question explored in the latest post to the (ISC)² Blog by Germany-based CSSLP Sorin Mustaca, in his fourth post now archived to the Blog; It is actually 5th post, but it was my fault that […]

Security security breach

Why is the news about 1.2 bil credentials stolen no news?

Source : http://www.securityweek.com/feedback-friday-russian-hackers-obtain-12-billion-credentials-industry-reactions Sorin Mustaca, IT security expert and author of the Mustaca on Security  blog: Every time I read such PR, it makes me think: “what are the press guys thinking when accepting such information without any kind of proof?”   In my opinion, the most worrying part into this matter is the company that […]

Security

Why the Security of USB Is NOT Fundamentally Broken

I am very, very unhappy about the Fear, Uncertainty and Doubt (FUD) created by Karsten Nohl and Jakob Lell  who will present their findings, as well as proof-of-concept software, at the Black Hatconference in Las Vegas this August. What makes me unhappy is how easy they generalize the fact that in some extraordinary circumstances some bad things can […]

(isc)2 CSSLP

Why we continue to fail on cyber security

I've been asked a lot of times, especially when I was working for an antivirus producer, why can't we simply write a software that always protects the users. Well, there is a short answer and a long answer. Short answer: Because 100% security does not exist and because most people are hackable due to being ignorant […]

improve-your-security

Myth: I am invisible if I use ‘incognito’, ‘private’ or ‘guest’ browsing

Alternatively referred to as Private Browsing, InPrivate Browsing, and Private Window and informally as porn mode, Incognito is a mode that prevents some type of information from being stored locally. Pages you view in incognito tabs won’t stick around in your browser’s history, cookie store, or… Read more → from Improve Your Security http://ift.tt/1oCsoW5 via improve-your-security.org Get the free eBook from […]

Antivirus Security

Why do we continue to fail on cyber security

Short answer: Because anyone is hackable due to being ignorant on what security is (of course, until he is hacked). Long answer: Human ignorance,  about everything that might happen and it is not certain to happen. According to Webster.com, the definition of IGNORANCE is: : a lack of knowledge, understanding, or education : the state of being ignorant […]

improve-your-security

500 readers of the “Improve Your Security” eBook

Thank you for your trust and interest in the book. For those of you who didn’t download the free eBook already, please have a look here: http://ift.tt/1rLpZcw Help me spread the word about this book: http://ift.tt/1rLq1Bg Read more → from Improve Your Security http://ift.tt/1rLpZcA via improve-your-security.org Get the free eBook from here

Security

Why should you sign your binaries

One of the larger questions facing the software industry is: How can I trust code that is published on the Internet? Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed by use of […]