CISPA

24. April 2013 Security 0
CISPA is about to become a reality. If you do not know what it is and how it can be used to destroy (your) privacy and rights, keep reading. I will not explain CISPA because that has been done a lot already. Instead i will provide you with links to websites that have done a ...

E-Mail security

23. April 2013 Security 5
Though a fair amount of security breaches can be blamed on equipment (example: router firmware with vulnerabilities), the weakest link is the user in most cases. This could be a user that configured a firewall in the wrong way or a user that left the default administrator name and password to the server but the ...

Java patched but still vulnerable

23. April 2013 Security 0
Java was patched just a few days ago but already new vulnerabilities are being discovered. Described in this Full Disclosure post, the Reflection API flaw affects all versions of Java SE 7 and, according to researcher Adam Gowdiak, “can be used to achieve a complete Java security sandbox bypass on a target system”. So, after ...

The firewall you haven’t thought about.

23. April 2013 Security 9
As mentioned in this article, your firewall is very important. Designed to analyze and filter inbound connections it is your first line of defense against intruders and common attacks such as port sniffing. Not many people have the firewall on their Mac enabled, they figure the router has one so everything on the network is ...

Data Security – Erasing it

21. April 2013 Security 1
You want to erase a part of your data, or all of it. Maybe you are replacing a small hard drive with a bigger one, maybe you are selling your Mac, doesn’t matter why, your information needs to be securely erased. Your Mac makes it very easy to get this done in a way it ...

Preparing for the day your systems get compromised (Home)

20. April 2013 Security 1
There will be a similar post that focusses on Office and Corporate environments. Hopefully you are reading this as a means to prepare yourself in case of an incident like this but you may be reading this after you have found out one or more of your systems have been compromised. You’ve read about it, ...

Java and Safari updates

17. April 2013 Security 1
Safari 6.0.4 was released allowing users to set the Java plug-in preferences on a site-by-site basis. Though this gives users more control over which sites are allowed to use Java or not, the feature has yet to prove itself. While we recommend installing the latest Safari update, we also recommend to keep Java disabled for ...

Securing your Router/WiFi

17. April 2013 Security 2
Today we’ll talk about something most home and office’s have. It’s so common now, most people don’t even give it a second thought, a router that enables you to have a WiFi network. It’s convenient, no wires so no clutter and possibly the weakest link in your home/office security. Wait, what? Yes, in a world ...

Security, your responsibility – Part 2

11. April 2013 Security 0
This is an addition to the “Security, your responsibility” post where i attempt to make users aware that any information they may have on others should be properly secured. This does not just go for your address book of course. Another example is Facebook. I hope you have a strong password to secure your account ...

Security is a full time job

11. April 2013 Security 0
And i don’t mean the IT guy at work or your spam filter service provider, i mean you. Anyone and everyone is responsible for their own security as i mentioned in a previous article. Of course your company has some staff (hopefully) that are there to ensure the company network is secured but that staff ...