CVE Changes Counter
The Common Vulnerabilities and Exposures or CVE is a registry for security related flaws and computer systems. The old counting system allowed only for 9’999 bugs per year. That’s no longer enough....
View ArticleOverview Of Man in the Middle Attacks
David Blake posted a current overview of Man in the Middle type attacks: 15 Surprising Ways You Could Fall Victim to a Man in the Middle Attack These include: Key-loggers (hard- and software) Browser...
View ArticleGoogle Shares Your WLAN Passwords with NSA
If you “Back up my data” is enabled on your Android phone, then Google keeps a clear-text, unencrypted copy of your WLAN passwords on its servers. Since Google is an US company, the government and its...
View ArticleHTML5 vs. Security
“HTML5 vs. Security” was a talk given by Thomas Röthlisberger of Compass Security AG which gave a nice overview over some of the security problems that HTML5 brings. Areas covered by the talk:...
View ArticleGood Summary of Heartbleed
This article contains a good summary of the Heartbleed bug and it’s consequences. Want to know whether you’re affected? Check sites you use here: filippo.io/Heartbleed/ Note: You will want to check the...
View ArticleBalancing Security
For your IT security, you want Security It must be cheap And comfortable Now choose at most two. As always in life, everything has a cost. There is no cheap way to be secure which is also comfortable....
View ArticleSurveillance Produces Blackmail Instead of Security
They say that “good” people have nothing to hide and, therefore, nothing to fear from surveillance. Everyone of us has something to hide. When we are confronted with out dark side, immediate, temporary...
View ArticleWhen Uncle Doc Gets Hacked
Most of the time, when users get infected with a computer virus or a Trojan, it’s a nuisance. But what happens when an important person becomes a victim of a cracker like your doctor? How about this...
View ArticleVirtual Cables for IoT Devices
IoT devices are a security nightmare: They should be easy to use / set up but hard to hack. With classic devices, the solution is “cable”. If there is no cable between two devices, they can’t talk to...
View ArticleKey Escrow that Might Work
Instead of encrypting everything with a single government key, several government agencies need to provide new public keys every day. The private key must be under the control of a court. Each secure...
View Article