ASIO, GCHQ and NSA: We listen to our customers…
security
Mashup Idea of the Day
With yesterday’s unsalted password dump at LinkedIn (seriously LinkedIn, wtf are you doing not salting your passwords?), the password dump of eHarmony and today’s suspected compromise at last.fm, this would be an ideal time to provide a service that tells… Read More ›
Opinion – What are common concerns about adopting cloud computing?
I am yet to be convinced that the current "Cloud Computing" wave is little more than vendor-driven marketing hype, driven by technologists that are chasing business revenue through the promise of "bottom line cost savings" – whilst conveniently ignoring business-critical… Read More ›
Issues with re-establishing Identity After Natural Disasters
As many of you will know, southern Australia is currently suffering the worst bushfires in peacetime history of Australia. Over 173 are confirmed as dead with many more injured, towns have been destroyed completely and people losing everything. The SBS… Read More ›
ALERT: Rogue Dropbear Loose in Brisbane CBD
Local media has today reported that a rogue Dropbear has been spotted in the Brisbane CBD terrorising the local population. Some think its only a Koala, but I think this guy is actually a close relative of the Koala –… Read More ›
gov.au Enters The Digital Age – not!
Most of you know I work in the Information Security area. You probably also know I am passionate about Australia. However, this post is not about the technical ineffectiveness of the technologies that have been proposed (which I will write… Read More ›
Again, Australian Organisations Complacent about Information Security
A colleague of mine at work started blogging again last weekend, highlighting a very good point that if 2-Factor Authentication is being offered to online gaming players, they why the hell are there still governments and financial institutions across the… Read More ›
Return of the Bootsector Virus?
A very interesting article caught my eye which is being presented to BlackHat Europe and HITB Dubai conferences. Two Indian graduates have developed a Vbootkit, which is just like a standard rootkit in Windows … but importantly is invoked before… Read More ›
Authorisation Management
A question posed by Gerry Gebel at the Burton Group around the difficulties of implementing authorisation management solutions. I’m not sure if the use of external authorisation solutions (the “Access Manager” products”) is the most appropriate in all cases. Sure,… Read More ›