category

The Register

SOPA Opera

We all have our concerns about piracy and violations of intellectual property, but the discussion taking place at the moment behind closed doors seems pretty one-sided.

Facebook, offensive content, and terse responses

I have yet to see any direct advice to Facebook users on the “Facebook Known Issues” page or the “Facebook Security” page.

Encryption, the Wonderdrug

One of the recurring themes of the past few years in the UK is data lost by the public sector on USB drives, CDs and so on.

SSL: Threatened by a BEAST of Prey

SSL isn’t hopelessly broken, but the widespread use of TLS 1.0 means that SSL cannot be regarded as fully “secure”

9/11: More Scams Upcoming

…the latest crop of malicious web pages to go up includes hooks such as “Bin Laden alive”, “in depth details about the terrorist attack”, “police investigation results” and “towers going down”,…

Proudhon and the Social Media

…both articles are concerned with breaches of copyright and IP abuse…

Calling for Backup

…what I had principly in mind at that point was the impact of some 4,800 of its customers whose businesses may have been threatened when data, sites and email on four of its servers were lost…

LulzSec lulls the NHS: not such bad lads?

…on the Twitter account owned by LulzSec that they had turned their attention to the NHS. Curiously enough, they seem to have been restrained and even responsible: while there’s an image out there of a message they claim to have sent to an administrator at an unidentified NHS site, they blacked out the details.

Phone Scams and Panic Attacks

…many scams work by panicking victims into taking some unwise action, whether it’s parting with their credit card details or opening a malicious program, claiming that some problem or illegal action is associated with their computer or IP address, such as transmitting malware or visiting paedophile or other pornographic sites…

Stuxnet, cyberwar, cybersabotage, blah…

While most of the recent media interest in Stuxnet has centred on the New York Times story, there’s been some thoughtful research published that considers it as just one aspect of larger issues: cyberwarfare, cyberespionage, cybersabotage and so on.

Limewire, free software, and for-fee membership

…there are a number of other potential risks from offers like this (as I’ve pointed out before) … Paying for software that’s actually free and for services that aren’t worth the money … Paying for software that turns out to be malicious … Parting with credit card and other data that might be misused…

Stuxnet the Inscrutable

This is an item you may not have seen amid all the speculation about Stuxnet, Iran and Israel.

Cascading False Positives

 Security researchers work together and share information in many ways and in many contexts that aren't constrained by company boundaries, but it's unusual for security researchers working for different vendors to join forces in a company blog. However, John Leyden of The Register contacted us both when he was writing an article on the controversy following

Fake Firefoxfur

There's an interesting post by Lee Graves about fake Firefox updates that actually push adware. It's pretty comprehensive, and lots of other blogs have picked up on it, so I won't rehash the issue here. However, I notice that The Register have credited us with the story (though they may have changed it by the

UK National Identity Database

The Register reports that "Home Secretary Alan Johnson has confirmed that the National Identity Register contains National Insurance numbers and answers to 'shared secrets'." See: http://www.theregister.co.uk/2010/01/07/id_register_includes_ni_numbers/ Johnson was responding to a parliamentary question about "what information will be held on the National Identity Register which is not held on the UK Passport Database." Inevitably, there

The out-of-control decade

We interrupt our – well, my – scheduled programming to bring to your attention an article in "The Register" that I think deserves your attention. I put up what was intended to be a brief pointer on the AVIEN blog (http://avien.net/blog/?p=253), but I found myself kind of warming to the subject, to the extent that I

Follow us

Copyright © 2016 ESET, All Rights Reserved.