Unsolicited Phone Call Scams – Part Two

In Part One, I talk about a phone call scam I received and how I had been passed by the “caller” to a “supervisor”, and then to a “technician”, and how the story just got better and more believable along the way. When it was the technician’s turn, he told me that I had over […]

Continue reading

Unsolicited Phone Call Scams – Part One

Phone call scams are becoming an epidemic. The phone rings and, upon answering, the caller promptly identifies himself/herself and often claims to work with a prominent organization, such as Microsoft – all of which is bogus. However, some of the craftier callers claim to be from the nearest major computer retailer in your area. The […]

Continue reading

Windows Server 2012 – An Overview

Windows Server 2012, the latest addition to the Microsoft Server operating system line up, was launched recently and with all the hype I just had to give it a spin.  In most cases, changes to server operating systems are hidden under the hood, yet this time round Microsoft has changed its interface to the new […]

Continue reading

Keeping Up with the Times

I came across two stories recently that made me wonder what the outcome would be if they were seen in parallel. The first, reported by Wired.com, showed how, despite being repeatedly told about the importance of security, people seem to block these warnings out and consciously, out of convenience, choose insecure practices.

Continue reading

Is Exchange Anti-Spam Enough?

We all know the importance of network security, yet it is also necessary to strike a balance between its costs and its benefits. This is not easy and there is no golden rule here, with the golden ratio being different for every organization. Because this is a vague area, it can also give rise to […]

Continue reading

When You Become the Enemy

Malware is distributed in a number of ways. Many web attackers focus their efforts on attracting potential victims to visit malicious sites and, to prevent this from happening, a lot of organizations restrict employee access to reputable sites only. Hackers, however, are aware of this practise and counter it by hacking legitimate sites and turning […]

Continue reading

European Legislation Might Outlaw Security Tools

In a recent post I had outlined my concerns about the Anti-Circumvention rules imposed by ACTA. I had suggested that as a result, legislation could in future be such that using certain tools required by the security profession – which could also be used by people with malicious intent such as disassembles – would be […]

Continue reading

You’ve got All Your Security Technologies in Place… Now What?

Antivirus and firewall solutions? Check! Regular vulnerability scans and patch management? Check! Web security software? Check! Security thinking? Ch-e…what? When we think about security we automatically think in terms of software. Without a doubt, these solutions are a must to enforce an organization’s network security but the journey shouldn’t stop there. You can only achieve […]

Continue reading

Is Your Deception Defense Strong?

April Fools is a whole day dedicated to the art of deception. Newspapers run spoof stories, pranks are pulled and the world generally does its best to tickle its collective funny bone. For that one day, that brief 24 hours, lies and deception become funny. That is, unless those lies and deception involve social engineering. […]

Continue reading

Danish Police Incident Calls for a Security Assessment

A department responsible for IT Security should, obviously, follow those practices it expects others to follow. Sometimes you come across situations where tasks that should fall under an IT security umbrella are handled by an external department which might not even be familiar with Security practices. These situations can cause a lot of problems and […]

Continue reading