Quantcast
Channel: Good Gear Guide - Stories by Andreas M. Antonopoulos RSS feed
Browsing latest articles
Browse All 15 View Live

The black market for identity theft

A while back I looked at the maturing market dynamics of cybercrime black markets and found that as professionals have come to dominate the hacking scene, a whole series of black markets have emerged.

View Article



Network threats develop 'antibiotic' resistance

The scientific field of biology has provided many useful metaphors, such as "virus" and "infection," for the study of malware. Many researchers have used biology and evolution science to create...

View Article

No excuses -- encrypt all laptops

Every year, more than 5,000 laptops are lost in taxis in London, New York, Chicago and other large cities. According to our research, in 2008 companies' topmost security investment was laptop...

View Article

UC security: When the shoe won't fit, compress the foot

If your security model is location-centric and depends on keeping things separate, how do you respond to a disruptive technology like unified communications? This is a pattern that keeps repeating in...

View Article

iPhone security problems bring new risks

In just four days, not one but two worms targeting the iPhone have emerged. Both of the worms target the same vulnerability, a default password in the SSH server that is installed on jail-broken...

View Article


Mobile malware will test Android and iPhone

2009 ushered in mobile malware with the first (and second) iPhone worm appearing just before Christmas.

View Article

Google's privacy afterthought

A few days ago, 10 privacy commissioners from Canada, the United Kingdom, France, Germany, Italy, Spain, Israel, Ireland, The Netherlands and New Zealand wrote an open letter to Google's CEO Eric...

View Article

Security-as-a-service growing

When you ask IT professionals if they use cloud computing or software-as-a-service, most start by saying "no". But if you ask some follow up questions, you will quickly find out about "that one...

View Article


The missing piece of cloud security?

Cloud computing, especially public cloud infrastructure-as-a-service is not yet a reality for the vast majority of companies. Recent announcements however, from VMware, Citrix and Oracle clearly show...

View Article


More censorship, data breaches and devices: Security predictions for 2011

This past year has been a doozy in the security world.

View Article

Security will rescue cloud computing

Whenever the topic of security is mentioned in the context of cloud computing, it is usually discussed as the "big barrier" to adoption. The perceived or actual lack of security in the cloud makes it...

View Article

Security fragmentation needs to end

A new week, a new rash of attacks against security vendors, email marketers and banks. It would be easy to point fingers and laugh at the irony, especially in the case of security vendors, but that...

View Article

How to be an effective security buyer

In previous columns I have repeatedly emphasized the importance of interoperability and the danger of security fragmentation. Security is so fragmented that it is often hard to discern between hype and...

View Article


Competing for privacy in a social media world

For years, Facebook users have been clamoring for better privacy controls and clarity, while Facebook engineers oscillate between improvements and major privacy snafus. Every now and then a new wave of...

View Article

Fail a security audit already -- it's good for you

Failing an audit sounds like the last thing any company wants to happen. But that's because audits are seen by many as the goal of a security program. In reality, audits are only the means of testing...

View Article

Browsing latest articles
Browse All 15 View Live




Latest Images