privacy

When do you hire your Chief Privacy Officer?

“Chief Privacy Officer” or “Data Protection Officer” is the name of the new job which will appear mandatory for businesses that are either located in the European Union or are doing business with EU. But, only if certain law is approved in October this year. Source: Networkworld.com The new law would apply to all companies […]

General

Change default passwords from your Internet enabled devices

Useless to write again about changing default passwords? Think again… I just bought two brand-new TP-Link WiFi Range Extenders, models WA860RE and WA854RE. Latest version, latest firmware. Both come with default username and password: admin. It is written on their back… Once you login, you will go through as wizard which configures the device. But, it […]

Uncategorized

VirusBulletin.com: Cyber insurance, is it for you?

This article was published first in Virus Bulletin. Sorin Mustaca looks at how companies trading online can insure the risks they run. Throughout its 25 year history, Virus Bulletin has regularly published technical analyses of the latest threats and defensive methods, and will continue to do so (with the material now available free of charge). We […]

Security

Nest thermostat vulnerable because of “developer mode”

The Nest thermostat is a smart home automation device that aims to learn about your heating and cooling habits to help optimize your scheduling and power usage. Debuted in 2010, the smart NEST devices have been proved a huge success that Google spent $3.2B to acquire the whole company. However, the smartness of the thermostat […]

improve-your-security

“Improve your Security” eBooks bundle

Hello dear readers, I finally found the time to optimize a bit the reading experience of the book. In order to allow everyone to quickly find what they are interested in, I split the book in topics and create individual… Read more → from Improve Your Security http://ift.tt/1kD4gTD via improve-your-security.org Get the free eBook from […]

CSSLP

Quoted in the (ISC)2 newsletter

    EMEA members are also sharing their expertise on the (ISC)² blog. Why we continue to fail on Cyber Security is the question explored in the latest post to the (ISC)² Blog by Germany-based CSSLP Sorin Mustaca, in his fourth post now archived to the Blog; It is actually 5th post, but it was my fault that […]

Security security breach

Why is the news about 1.2 bil credentials stolen no news?

Source : http://www.securityweek.com/feedback-friday-russian-hackers-obtain-12-billion-credentials-industry-reactions Sorin Mustaca, IT security expert and author of the Mustaca on Security  blog: Every time I read such PR, it makes me think: “what are the press guys thinking when accepting such information without any kind of proof?”   In my opinion, the most worrying part into this matter is the company that […]

Security

Why the Security of USB Is NOT Fundamentally Broken

I am very, very unhappy about the Fear, Uncertainty and Doubt (FUD) created by Karsten Nohl and Jakob Lell  who will present their findings, as well as proof-of-concept software, at the Black Hatconference in Las Vegas this August. What makes me unhappy is how easy they generalize the fact that in some extraordinary circumstances some bad things can […]

(isc)2 CSSLP

Why we continue to fail on cyber security

I've been asked a lot of times, especially when I was working for an antivirus producer, why can't we simply write a software that always protects the users. Well, there is a short answer and a long answer. Short answer: Because 100% security does not exist and because most people are hackable due to being ignorant […]

improve-your-security

Myth: I am invisible if I use ‘incognito’, ‘private’ or ‘guest’ browsing

Alternatively referred to as Private Browsing, InPrivate Browsing, and Private Window and informally as porn mode, Incognito is a mode that prevents some type of information from being stored locally. Pages you view in incognito tabs won’t stick around in your browser’s history, cookie store, or… Read more → from Improve Your Security http://ift.tt/1oCsoW5 via improve-your-security.org Get the free eBook from […]