Category Archives: Tech Zone
Why spamming is an easy business – and the problems it causes
Recently, whilst searching for a particular solution on the Internet, I encountered the following post in a forum: Surely, not the solution I was looking for. However, the post is strange and did catch my attention. Apart from the broken …
Trust: Security, the enemy of Security
In the previous posts about Trust I outlined how things that are designed to help you with your security can sometimes hinder that very security that you are trying to achieve. Today I will take that even further and outline …
Spying – the new black?
Today I came across a very disturbing story by Mike Masnick at techdirt. Mike reports about a class action suit by some students who claim the school was monitoring them through the webcam from laptops they were issued by said …
How Secure can Security be?
Today I came across a series of articles that claims that most solutions that encrypt voice communications on mobile phones are not up to par and can easily be intercepted. My first reaction was that this was a very bold …
Shell’s Data Breach: A Security Spill?
This week the BBC reported that someone has disclosed contact details for 170,000 of Shell’s employees world wide. The disclosure comes with a note claiming it is being disclosed by former employees who can’t stand the damage the company is …
Trust – Certifications
Recently I wrote an article about how Trust can be a security risk in one’s environment; today I will expand on that further. On the 4th of January H-Online reported a story where security firm SySS managed to get around …
Internet Explorer 0Day Vulnerability: The Aurora Exploit
In the modern age vulnerabilities are discovered in one of two ways; organizations, researcher, testers and white hats test applications for vulnerabilities due to their line of work or simply to build a reputation. Once these individuals find vulnerabilities they …
How to handle security
I’ve previously discussed how important it is to pay attention to the medium you’re using; transferring data via satellite for example puts you at great risk as you’re spreading your data on a wide geographical range, in most cases unencrypted. Everyone …
The Threats of Steganography
Steganography is the art of concealing messages into something innocuous in such a way that it is extremely difficult for someone to suspect, let alone find, a hidden message. The etymology of the word “steganography” comes from the Greek language …
Trust – The Enemy of Security?
Some time ago I was reading about the Counterfeit banknote detector pen. This pen basically writes in yellow on genuine money but in black or grey on fake money. So I thought, great but doesn’t that mean that if a …









