CTACtile
...if you're a Facebook user, you might want to try the CTAC Facebook page. I've taken to posting links to CTAC output there at the same time as I tweet it...
...if you're a Facebook user, you might want to try the CTAC Facebook page. I've taken to posting links to CTAC output there at the same time as I tweet it...
As the war rages, the APT group with a long résumé of disruptive cyberattacks enters the spotlight again
With vacations in full swing, cybercriminals will be looking to scam vacationers looking for that perfect accommodation.
Public speaking and presenting at conferences can be daunting for the majority of people but by including some subtle tricks, the speaker can deliver a stronger message
Our lineup may seem heavy on the defensive side, but such is the nature of game plans for warding off a range of threats lurking in cyberspace
Don't get more than you bargained for. With the 2018 FIFA World Cup in Russia just days away, fraudsters are increasingly using all things soccer as bait to reel in unsuspecting fans.
World Backup Day is a timely reminder of the importance of taking effective measures that can make all the difference when a data loss incident strikes.
Regardless of how prominent and effective ransomware appears to be, it is not the most dangerous form of malware.
In the spirit of this year’s Olympics, which is being held in Rio de Janeiro, we thought we’d host our own little information security Olympic Games.
US government data say 45% curtail online activity due to privacy and security fears, which is sad but not surprising because we could see this coming.
This week in security news saw the world’s researchers discover a whole new range of Achilles Heels for PCs, the online privacy service Tor, and even ‘connected’ gadgets such as internet fridges.
The business-focused social network has seen a lawsuit related to the June 2012 hacking of its web site overturned in a San Jose federal court. The criminal hacking resulted in the release of 6.5 million passwords causing the Mountain View based company to instruct some of its members to reset their passwords, in a speedy response to the incident.
In an escalation of the tendency to require companies to be forthright with their users following a breach, a European Union proposed bill intended to overhaul a 17-year old law is making progress. This week EU will outline the overhaul to the existing rules, hoping to encourage more expedient communication efforts following a breach, in
With Facebook's launch of video chat powered by Skype underway and enabling a new level of communication on its platform, we take a look at permission settings and privacy options.
Dear Twitter, I'm afraid our relationship is just not working these days: in fact, we seem to have stopped communicating almost immediately you cosied up to our mutual friend Tweetdeck. Clearly, I'm the spare part in this relationship, since Tweetdeck isn't talking to me much, either. How can you treat me like this? Since I'm
Introduction As the sun is setting and I breathe some of the night time air I am inspired to write about Facebook. Yes, *the* Facebook, the third largest country if it were a physical place with boundaries under a common rule of law and government. When many people use a service such as this, it
Greetings Dear Reader, We have published guidance material previously on passwords and passphrases, some are blogs and some are lengthier depending on your liking (link & link). Even still it is always good practice to reinforce sensible password techniques. For this blog, I plan on sharing an analogous self-ritual, and one that relies on a
There are reports coming out today about Google Android and how approximately 99.7% of its users are potentially open to compromise. This news cycle started by the Ulm University publishing some information on the 13th of May showing some results. I'm sure this story will develop and CTAC may follow-up to my blog with more details;
[Final Update… I think – THERE WAS NO KEYSTROKE LOGGER please see https://www.welivesecurity.com/2011/03/31/samsung-and-i-got-bit-by-a-vipre to find out what happened.] [Update – There will be a new blog about this incident. I relied upon the information at http://www.networkworld.com/newsletters/sec/2011/040411sec1.html that Samsung had confirmed the presence of the keystroke logger in asserting that the laprops were infected. Since then
George Santayana was a really smart philosopher. He is best known for his quote “Those who cannot remember the past are condemned to repeat it”. If you want to learn a little something from the past so as not to repeat other people’s mistakes then you can read Aryeh’s blog from when the first iPad