Security Institute Manifesto Launch

On November 17, 2014, in Privacy, by transxf1

Even though our website and planned products are designed to thwart attacks to digital identity and privacy, we look at the use of the word Manifesto with some skepticism.  The word itself has a negative connotation, at least to this blogger. During the cold war we had the Communist Manifesto. But now a security manifesto? […]

Splikity – Simple And Secure Password Manager

On November 7, 2014, in digital identity, by transxf1

Password managers are an important component of our identity and security toolkit.  Whether they work by themselves or a part of a more sophisticated IdM system is an important characteristic when evaluating these for personal or business use. If the password retrieval is available only on the device you are using, then physical security becomes […]

Hackers Are Using Gmail Drafts to Update Their Malware and Steal Data

On October 31, 2014, in Security, by transxf1

When I ceased using Thunderbird as my main email client late last year, I did so because for some mysterious reason it was generating hundreds of sent mail messages every time I used my Android phone to originate or reply to messages . Back at the mothership, a company account at a hosting company, the […]

British Spies Don’t Need a Warrant To Sift Through NSA Surveillance Data – Defense One

On October 30, 2014, in Privacy, by transxf1

The boundaries that separate international law, national rights, freedom of speech, and terrorism continue to become more blurred as the national agencies in countries like the US and Britain diligently work to protect human lives and information exchanges. Of course these agreements and “policies” are controversial.  The nature of the available activity – telephonic and […]

Do Organisations Face A Security Risk From Apps?

On October 28, 2014, in Security, by transxf1

Shadow IT is just a euphemism for any connected device inside a private network (your LAN) that can send and receive data through your firewall (or gateway) without any permissions or port controls.  As such you will always be at risk depending upon the activity itself.  Whether or not your user is trustworthy is rarely […]

FIDO Alliance Members Introduce FIDO Authentication to Mobile World Congress 2014 | FIDO Alliance

On October 22, 2014, in Identity Security, by transxf1

“At Mobile World Congress, FIDO Alliance members will engage the global mobile community in our important quest for universal strong authentication.  Like the Internet, the mobile industry is limited until strong authentication standards are ubiquitous. Trust is foundational to mobile markets – mobile users who can trust that the products and services they use are […]

60 Percent of Android Attacks Use Financial Malware

On October 21, 2014, in Security, by transxf1

In case you thought that your Android device was immune from malware or virus attack, consider this report from Kaspersky Lab: ” “During the past few years we have witnessed the rise of mobile cyber threats which have become more complex and intelligent enough to target specific entities. With the mobile market growing exponentially, it […]

Don’t Be That Guy Privacy Videos Available Now

On October 16, 2014, in Security, by transxf1

Trend Micro is one security product vendor I have evaluated, used, recommended, and deployed at client sites.  While this post is not a paid endorsement, I trust their judgment about the contents of videos designed to help companies and users make decisions about how to protect themselves on the Internet. Don’t Be That Guy who […]

The use and capability of consumer technology is far outpacing understanding of how it works

On October 13, 2014, in Opinions, technology, by transxf1

The title is a quote from a recent post from Network World, “Who’s to blame for Snapchat’s massive nude photo leak.”  (Apologies for not including the link here) But a reading of Network World’s coverage of the snafu demonstrates the importance of this post’s title, that the “Brave New World” of technology is probably upon […]

NSA snooping tactics will be copied by criminals in 3 to 5 years

On October 9, 2014, in Privacy, by transxf1

“If you thought NSA snooping was bad, you ain’t seen nothing yet: online criminals have also been watching and should soon be able to copy the agency’s invasive surveillance tactics, according to security guru Bruce Schneier. “The NSA techniques give about a three to five year lead on what cyber-criminals will do,” he told an […]