improve-your-security

Security checklist for “Back to school”

The summer closes to end soon and we know that the next thing to happen is: children go back to school. Parents are always concerned (for good reasons) for what and how their children will do, and since a couple of years they have other concerns. Their children have smartphones, multiple online identities – parents […]

Security

Security through obscurity: Smart Light bulb Exposes Wi-Fi Password

A team of British security consultants (Context) hacked their way into a private Wi-Fi network — using Lifx bulbs as the backdoor. In a typical Lifx setup, one bulb will automatically serve as the “master,” communicating directly with your smartphone and then relaying all info to other “slave” bulbs. Context’s team was able to hack their […]

General

What are functional and non functional requirements and why both matter

In software engineering (and Systems Engineering), a functional requirement defines a function of a system or its component. A function is described as a set of inputs, the behavior, and outputs (see also software). Functional requirements may be calculations, technical details, data manipulation and processing and other specific functionality that define what a system is supposed to accomplish. Behavioral requirements describing all the cases where […]

Security

The sad state of Java security

I wrote many times about Java, their vulnerabilities, how to disable it… Just search in this blog for the term Java.         I’ve been asked many times why do I think that we are seeing these zero day vulnerabilities. The problem The problem of Oracle is that they bought a technology that was […]

quoted Security

Quoted in Softpedia about browser security

Source of the article: http://www.softpedia.com/reviews/windows/Google-Chrome-Review-345916.shtml Another aspect pointed out by Avira’s Security Product Manager Sorin Mustaca is Google’s effort to keep their browser safe. “Especially when we are talking about the Chrome browser, we have the already famous hacking sessions, which Google organizes to find vulnerabilities in the browser. This shows how important the security is for […]

General

How would you describe yourself?

Your LinkedIn profile can tell someone a lot about you. But, what are your strongest skills? How could you describe yourself in a few words?   Here is how: create a cloud of words from your profile enhancing the words that appear most.                 Here are more of […]

General

Security 101: December 2012

How safe is internet banking when I am using a smartphone to do it? I noticed several banks provided apps to do mobile internet banking and share trading but does it really work? Smartphones have much limited security functionality than desktops. However, they do share one weakness: they are both equally exposed to external attacks if they transmit non-encrypted data over non-encrypted Internet […]

quoted

Quoted in Washington Time: smartphone security

The article ran today from Shaun Waterman of The Washington Times re: smartphone security: http://times247.com/times-news/tech-firm-makes-smart-phones-safer     Fraud follows the money Researchers in Europe have identified malware that surreptitiously forces smartphones to make calls or send text messages to premium rate lines, racking up income for the crooks who own the numbers and huge bills […]