Pages: 1 ... 3 4 5 6 7 ...8 ... 10 ...12 ...13 14

  2010-08-24

Understanding the security risk of SaaS

  22:29, by Hagai Bar-El   , 745 words
Categories: IT Security, Counter-media
Software as a Service (SaaS) is one of the hot trends in Information Technologies. “SaaS” is the name given to the concept of having applications run on the infrastructure of the service provider, rendering service to the customer over the net. The… more »

  2010-05-19

Automobile hack: we should have known better

  22:28, by Hagai Bar-El   , 776 words
Categories: Security Engineering, Counter-media
No one in the automotive security industry could miss the recently published news article titled “Beware of Hackers Controlling Your Automobile”, published here, and a similar essay titled “Car hackers can kill brakes, engine, and more”, which can be… more »

  2010-03-24

InZero provides some security

  22:25, by Hagai Bar-El   , 826 words
Categories: IT Security, Counter-media
I was just made aware of InZero, a new physical device that you connect to your PC, and your browsing becomes secure. I find it amazing that some people treat it as among the most revolutionary of security solutions. I think the InZero device is cool.… more »

  2009-09-02

A business model based on people making bad security trade-offs

  22:24, by Hagai Bar-El   , 483 words
Categories: IT Security, Counter-media
From time to time I am exposed to a new service, sometimes security-related, that promises something new. More often than not, the new security service is novel, but only because either no one really needs it, or because it does not form a good balance… more »

  2009-07-24

Companies collect data on us --- so what?

  22:22, by Hagai Bar-El   , 865 words
Categories: Security Policies, Counter-media
It is very common among security people to take privacy issues seriously. When we hear that a particular service collects personal data on us, we get extremely anxious. We will not use services that collect personal data that are not necessary to render… more »

  2009-04-04

On the Purpose of Security Standards

  22:21, by Hagai Bar-El   , 960 words
Categories: Security Policies, Counter-media
An interesting article was published in Information Security Resources, titled: “Payment Card Industry Swallows Its Own Tail”. The author seems to claim that PCI DSS may not survive for long, because the various stakeholders are too busy blaming each… more »

  2009-03-06

Right, the kernel can access your encrypted volume keys. So what?

  22:19, by Hagai Bar-El   , 717 words
Categories: Security Engineering, Counter-media
On January 15th, TechWorld published an article called Encryption programs open to kernel hack. Essentially, it warns that the key to encrypted volumes, that is, to volumes of software-encrypted virtual drives, is delivered by the encryption application… more »

1 ... 3 4 5 6 7 ...8 ... 10 ...12 ...13 14