Welcome to TechNet Blogs Sign in | Join | Help

Browse by Tags

All Tags » Social Engineering   (RSS)
Steve Horne wrote a thought provoking post about being locked out of Second Life due to the Grey Goo attack. Slashdot's post explained pretty clearly what happened as follows: "Spinning gold rings began to appear in the air and on the ground, and as users Read More...
There's a little story on the ever entertaining Stupid Security blog that explains how the mere presence an Apple Mac logo is (or rather is not) enough to ward off all nasty malware. It made me smile. If only information was a simple as changing brands. Read More...
A friend of mine has just purchased a brand new mobile phone which includes the facility to post images to his blog. In principle this seems like a really useful feature for those who what are into blogging. As blogging becomes mainstream then removing Read More...
If you're into Open Source and or LINUX and plan to be in the UK this weekend perhaps you'd enjoy LURadio Live 2006 . There's sure to be plenty of lively debate and if last year's event is anything to go by there are likely to be in excess of six hundred Read More...
Note: I took this picture myself - it's not a fake. Clearly we don't want to use scare tactics for Information Security but my ongoing frustration with users who fail to bother locking their PC desktop sessions when leaving their machines unattended makes Read More...
I've been browsing through my junk email - I'm not quite sure why I'm bothering to do so though sometimes I find a couple of entertaining messages. I particularly like the one that starts "Dear Member, you've been selected for a free holiday...", which Read More...
At last - an interface for real people - i.e. those that aren't technical security experts. The following dialog message is part of Windows Vista The built-in Windows Vista personal firewall settings are automatically configured according to your answer. Read More...
The IE Team blog have announced that Internet Explorer running on Windows Vista will be known as Internet Explorer 7+ (IE 7+) to distinguish it from IE 7 on Windows XP. This makes sense to me as the prime additional feature of Internet Explorer on Windows Read More...
In security circles we tend to view Trust as a Binary property - either we trust someone or we don't. Our application of security controls tends to mirror this. Surely we should reflect that there are degrees of trust. I trust a very small number of intimate Read More...
Browse here to access the slides yourself. This follows yesterday's post which indicated that the links were broken - thanks to Craig et al who verified the problem. Read More...
Information is NOT Power. Timely access to accurate information can give the holder the ability to make powerful decisions. Effective Information Technology can enable the required flow of information. Inappropriate Information Security Policues, Processes, Read More...
Click here to download Internet Explorer 7 Beta 2 . IE 7 is nearing release bringing with it a wealth of security improvements including significant re-engineering and new features including the anti-phishing filter. Much will no doubt be made of the Read More...
This is the final part of a three part response to a comment made by Matt in his comment regarding the least privilege model in Windows Vista. Part 1 was: Let's review how privilege is used in Windows NT, XP, 2000 and 2003 : Part 2 was: How will User Read More...
Browse here to read a new interesting security blog written by Paul Vincent - he's titled it "Secure I.T or lose IT" which I particularly like. Paul blogs about "Microsoft security and how we can stop the bad guys from stealing our stuff" - it's well Read More...
You may have seen the short video clips of Bill Gates' keynote speech at RSA 2006. If you're anything like me you'll want to find out exactly what Bill had to say for the entire speech. The transcripts of most speeches made by Microsoft executives can Read More...
More Posts Next page »