Quick pick

NIS2

NIS2

11 posts
ISO 27001

ISO 27001

19 posts
AI & ML

AI & ML

7 posts
SSDLC

SSDLC

14 posts
improve-your-security

500 readers of the “Improve Your Security” eBook

Thank you for your trust and interest in the book. For those of you who didn’t download the free eBook already, please have a look here: http://ift.tt/1rLpZcw Help me spread the word about this book: http://ift.tt/1rLq1Bg Read more → from Improve Your Security http://ift.tt/1rLpZcA via improve-your-security.org Get the free eBook from here

Security

Why should you sign your binaries

One of the larger questions facing the software industry is: How can I trust code that is published on the Internet? Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed by use of […]

Security

Security through obscurity: Smart Light bulb Exposes Wi-Fi Password

A team of British security consultants (Context) hacked their way into a private Wi-Fi network — using Lifx bulbs as the backdoor. In a typical Lifx setup, one bulb will automatically serve as the “master,” communicating directly with your smartphone and then relaying all info to other “slave” bulbs. Context’s team was able to hack their […]

Security

Cyberattacks can damage your business. Permanently. Here is how to prepare yourself.

Dieser Artikel ist auf Deutsch verfügbar: http://tcadistribution.wordpress.com/2014/07/01/wie-cyberangriffe-auch-ihrem-unternehmen-schaden-konnen/    We’ve learned after the Code Spaces incident that started as a DDOS, continued with hacking and then blackmailing that cyberattacks are not something one should ignore. The long story of CodeSpaces put short was: a hacker started a DDOS on the company’s website and services. Nothing unusual, just […]

Spam & Phishing

Spam impersonating Google Support

I wrote already about spam impersonating various services just to make users click in order to visit a website. Most of the time, it is about online pharmacies. This time, it is Google’s Support impersonated, as if it would contact the user to restore damaged messages. I leave aside the fact the this is technically […]

Spam & Phishing

Spam using WhatsApp voice mail

      I wrote before about various tricks that cybercriminals use to attract people to do something (btw, this is called “social engineering”). This time, they make use of the well-known WhatsApp (written like I did and not like in the screenshot below) to redirect users to an online pharmacy website.     The […]

News question Security

Truecrypt shutdown – 5 questions that must be asked

If you visit www.truecrypt.org you see this text below. If you install the software, you see it quite a couple of times. The domain www.truecrypt.org  is only redirecting now to www.truecrypt.sourceforge.net. There are many articles written on this topic, especially on “WHY?”. WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues This page exists […]