Category: "Counter-media"

About the Counter-Media category

  21:11, by Hagai Bar-El   , 172 words
Categories: Counter-media

One of the main objectives of this blog is to put security related facts and events in the correct perspective.  This is needed in cases where the traditional media has its own objective of blowing news out of proportion. The security media, often sponsored either by advertisers or by product vendors, has an occasional tendency of disseminating FUD (fear, uncertainty, and doubt) more than necessary. For example, they can take a single unattributed compromise of a web-server and shout that "cyberwar is here".

Without arguing who is right, many of the posts in this blog bring forward the other side of the coin. They show a different perspective than that shown by other sources. The goal is never controversy in its own right; it is to make the reader truly informed, by showing the angle that doesn't get the headlight.

The counter-media category consists of such posts that present perspectives, insights, and opinions, that may differ substantially from those typically presented by the media, and by that provide food for independent thought.

 

Pages: 1 3

  2009-09-02

A business model based on people making bad security trade-offs

  22:24, by Hagai Bar-El   , 483 words
Categories: IT Security, Counter-media
From time to time I am exposed to a new service, sometimes security-related, that promises something new. More often than not, the new security service is novel, but only because either no one really needs it, or because it does not form a good balance… more »

  2009-07-24

Companies collect data on us --- so what?

  22:22, by Hagai Bar-El   , 865 words
Categories: Security Policies, Counter-media
It is very common among security people to take privacy issues seriously. When we hear that a particular service collects personal data on us, we get extremely anxious. We will not use services that collect personal data that are not necessary to render… more »

  2009-04-04

On the Purpose of Security Standards

  22:21, by Hagai Bar-El   , 960 words
Categories: Security Policies, Counter-media
An interesting article was published in Information Security Resources, titled: “Payment Card Industry Swallows Its Own Tail”. The author seems to claim that PCI DSS may not survive for long, because the various stakeholders are too busy blaming each… more »

  2009-03-06

Right, the kernel can access your encrypted volume keys. So what?

  22:19, by Hagai Bar-El   , 717 words
Categories: Security Engineering, Counter-media
On January 15th, TechWorld published an article called Encryption programs open to kernel hack. Essentially, it warns that the key to encrypted volumes, that is, to volumes of software-encrypted virtual drives, is delivered by the encryption application… more »

  2008-01-26

The TSA Does Not Get It Completely Wrong

  22:09, by Hagai Bar-El   , 537 words
Categories: Security Policies, Counter-media
Many homeland security experts preach against the approach to airport security taken by the TSA. The TSA's mitigation efforts focus primarily on specific tactics that terrorists may use, rather than on more generalized, more effective, measures, such as… more »

  2008-01-13

The iPhone Hack -- Security Done Wrong or Security Done Right?

  22:06, by Hagai Bar-El   , 552 words
Categories: Security Engineering, Counter-media
A while ago the iPhone was hacked so to make it usable on networks other than AT&T's. Since that moment, many opinions were sounded on how Apple could have done their security better and how the hack could have been eliminated. Moreover, some of… more »

1 3