Pages: 1 ... 3 4 5 6 ...7 ... 9 ...11 ...12 13 14

  2011-01-28

Cyber-war Risk Exaggerated?

  23:02, by Hagai Bar-El   , 700 words
Categories: Security Policies, Cyber Security, Counter-media
A ZDNet article, Cyber-war risk is exaggerated, says OECD study, points to what seems as a thorough study that concluded with the stated result. I never read this study, but from the article one can point one point in which it is probably right and one… more »

  2011-01-08

Car Automation. Me? Worried?

  22:48, by Hagai Bar-El   , 732 words
Categories: Security Engineering
Cars will soon be (almost) fully automated. News on experiments with cars that drive by themselves, in different scenarios and situations, make it seem obvious that soon enough the role of the driver is to be similar to that of a pilot in a passenger je… more »

  2010-12-18

The Effect of Wikileaks

  22:47, by Hagai Bar-El   , 689 words
Categories: IT Security
Wikileaks did evil. It published stuff that should not have been published. Julian Assange acted carelessly, I think. Still, the impact of Wikileaks is not what we usually think it is. The security of citizens was not affected by Wikileaks, but by the… more »

  2010-11-16

Overcoming Distrust in CAs Using External Quality Enforcement

  22:46, by Hagai Bar-El   , 790 words
Categories: IT Security
A few weeks ago, I wrote about the inherent limitations of the certification model. This model cannot be expected to provide a solution to the binding of entities to public keys, primarily because Certification Authorities (CAs) have no financial… more »

  2010-11-05

Recommended Podcast: Security Now

  22:43, by Hagai Bar-El   , 307 words
Categories: Sources
There are many IT security podcasts out there; too many, perhaps. Certainly too many to listen to. The challenge is to decide on which ones to follow on a regular basis. I became aware of a good candidate a couple of years ago, and since it retained its… more »

  2010-10-28

Preventing the Evil Maid Attack on FDE

  22:33, by Hagai Bar-El   , 467 words
Categories: IT Security
The attack referred to as the ”Evil Maid Attack”, or the “Cleaning Maid Attack” against full disk encryption (FDE), is considered as one of the serious attacks concerning people who travel with laptops full of confidential information. This attack… more »

  2010-10-22

The Inevitable Collapse of the Certificate Model

  22:30, by Hagai Bar-El   , 755 words
Categories: IT Security, Counter-media
Many had high expectations from the SSL/TLS certificate model. At least on paper it sounded promising and worthwhile. Keys are used to protect traffic; for this to be effective, keys shall be bound to business entities; for the binding to be trustworthy… more »

1 ... 3 4 5 6 ...7 ... 9 ...11 ...12 13 14