Malware targeting MacOS

Over the last few days several reports of high profile compromises in organisations like Facebook (Protecting People On Facebook), Apple ( Apple says some employee computers were breached by hackers) and most recently Microsoft ( Recent Cyberattacks) were made public with a worrying underlying theme. It appears that online criminals and other adversaries are increasingly […]

BSidesLondon 2012 – The Feedback

More than two months passed since BSidesLondon 2012 attracted a crowd of over 300 participants, volunteers, speaker, press and sponsors; high time to go through the feedback forms many of you dropped of in exchange for one of the Yubikeys we handed out (as long as stock lasted). Thanks to everyone who took the time […]

Data breaches & log management: A lawyers view

I stumbled upon an interesting article on the ReedSmith blog with the title “Log File Management & Retention Programs: Put the Systems in Place to Turn Static Logs into Active Real-Time Intelligence“. The author is summarizing reasons why (if i may add – correctly implemented) log management and retention is one of the things organisations […]

Convenient email security – opportunistic encryption

A conversation i had the other day touched on the topic of transferring data via email and the risks this poses to the information contained. This kind of conversation seems to come up quite regularly and in many cases the assumption is made that mails sent via the internet are transferred in clear text unless both parties venture in […]

Typosquatting and Doppelganger domains

A whitepaper released earlier this week by GodaiGroup’s Garrett Gee & Peter Kim investigates issues around domain name similarities and typos. I do recommend the read as the paper contains noteworthy information but I believe that most InfoSec professionals will find the facts and takeaways rather boring. It has been topic of discussions and presentations at security events […]