Irish Government To Run Cyber Security Tests

April 4, 2013 // 1 Comment

According to Silicon Republic, the Irish government is to run some cyber war games to test their responses and resilience to digital attacks.  That’ll be interesting; a few years ago the Irish government decided to implement a very unpopular and ineffective DNS-based copyright (and [...]

Bank of Ireland’s Stupid Phishing Phone Calls

March 13, 2013 // 3 Comments

This afternoon I got a phone call from a -blocked- phone number.  I answered.  The person who called said he was calling me from Bank of Ireland.  I got the usual “the call is being recording for training purposes” speech.  And then the shocker: “I need to ask you some [...]

Microsoft Security Intelligence Report – H1 2012

October 10, 2012 // 2 Comments

Volume 13 (Jan-June 2012) of the Microsoft SIR has been released.  Last year I read the same one, and Conficker was still the number 1 malware on domain-joined computers.  What nuggets are there this year? Before we get there … I heard of another report (Symantec I think) that a new [...]

Want To End Your IT Career? Then Recommend Java!

August 30, 2012 // 4 Comments

I hate Java.  There, I said it.  Any IT pro who has had to support multiple versions of this malware breeding ground knows that Java is a complete nightmare.  I detested dealing with Java when I was an administrator/engineer.  Well, the chickens have come home to roost for Oracle. A [...]

Once You Go BYOD, What Happens To Information Security?

July 26, 2012 // 0 Comments

I just glimpsed at a post on NetworkWorld called Email in security hot seat with rise of cloud, BYOD.  In it I saw this piece of text: IBM famously issued a new set of BYOD policies that, among other things, forbid employees to use a competitor’s cloud service (no more Dropbox, no more [...]

Hyper-V Is NOT Affected By VU#649219 VM “Break Out”

June 15, 2012 // 0 Comments

It was reported by the media earlier this week that an issue on Intel based servers could lead to a “break out” from a VM to the host in certain virtualisation products, including Microsoft.  Obviously this would be a huge concern, especially in environments where security and isolation [...]
1 2 3 6