Security Coin

Different Issues. Two Sides. One Coin. Your Information.

Sep 24, 2008

Insecurities in Privacy Protection Software

›
I recently wrote an article for INSECURE Magazine (awesome mag BTW!) on the lack of protection given to one's sensitive information, ir...
Sep 3, 2008

Is an incorrectly implemented security program better than a non-existent one ?

›
Think carefully before you answer that one. A large majority of you would be inclined to give a resounding 'yes' - but I really want...
Jul 31, 2008

Random stuff on my to do list

›
SQL injection in web apps is sooooo old. It still exists everywhere and security companies are still making good moolah by capturing 'cr...
Jun 19, 2008

.. and now - PIN stealing..

›
Once the bad guys figured out how easy it was to sniff unencrypted ATM and card authorization traffic to steal track data, and after making ...
Apr 1, 2008

Secure Email from Voltage

›
Voltage offers one of the many alternatives present in the industry for secure encrypted email communication. It is supposed to have incorp...
3 comments:
Mar 29, 2008

ID Theft Incidents

›
Chris Hoofnagle published a report that attempts to measure ID thefts at major financial institutions. It is no surprise that BoA is the le...
Mar 24, 2008

Can I get your Username and Password ?

›
A while back, I got a call from someone claiming to be from a major benefits provider and said " Hello Sir. We noticed that you have a...
›
Home
View web version
Powered by Blogger.