Entries for 'Gary Newe'
With the recent headlines about vulnerabilities in home broadband routers, http://www.scmagazineuk.com/concerns-over-asus-and-linksys-router-vulnerabilities/article/334710/ and http://www.bbc.co.uk/news/technology-26417441 ,
I was reminded of something that happened to me.
A True Story
I was spending time with my extended family over Christmas and, as usual, we all had our heads in our phones or “i” devices. Working in IT I generally spend my holidays fixing...
Are service providers ready for the new EU roaming regulations?
The impending EU roaming regulations are due to come into effect from July 2014, when incoming calls will no longer be charged. Although this is an exciting prospect for consumers, it is potentially troublesome for service providers, particularly as the combined pressures from the EU and demanding subscribers are being compounded as networks shift to IP-based 4G/LTE infrastructure.
With the LTE network now relying on new archi...
/* Style Definitions */
As a descriptive term ‘IT agility’ has, like ‘cloud computing’, ‘virtualisation’ and ‘SOA’, become so widely used that finding a common definition is difficult. Especially when many people use the term to describe something that they have always done and are simply trying to reframe something so it is more meaningful and up to date.
To take two of these: to me, agility and cloud are interchangeable. If you are agile, you can react to change. Unlike an oil tanker you can change course very quic...
With all that has been going on lately you could be mistaken for thinking that the online world was under serious threat, too dangerous to visit and subject to a Foreign Office travel warning.
There have been a plethora of headlines reporting data breaches into household name companies or banks. From Sony to Citibank, it seems that no-one was safe. Wave after wave of threat from the latest online group of so-called hackers turned political activists.
I say ‘so-called’ because ‘real’ hackers, a...
Further thoughts on the 2011 Verizon Data Breach Investigation study. This year’s report reports a drop of insider related threats. What is interesting is that 92% of attacks stemmed from external agents, and in 2011 11% were from social engineering attacks. There is a decrease in social engineering related attacks, but external attacks in general have risen by 22%.
Out of the external attacks, 58% of these were committed by criminal gangs which is further proof indicating, as if more were nee...
Have you seen those status updates in Facebook?
"PLEASE put this on your status if you know someone (or are related to someone) who has been EATEN BY PANDAS. Pandas are nearly unstoppable and, in case you didn't know, they can also breathe fire. 93% of people won't copy and paste this, because they have already been eaten by pandas. 6% of people are sitting in their showers armed with fire extinguishers, and the remaining 1% are awesome and will repost."
In any system there is a weak link, and...
The outage at Amazon ‘surprisingly’ took a lot of large profile sites with it. ‘Surprisingly’ in the sense that it is surprising that these sites didn’t have a back-up plan.
Working in IT adds a third certainty to taxes and death: things will fail! That is why we take backups. That is why we plan for failures, and that is why we never, never rely on a single point of failure. This is why the business continuity (BC) market is expected to be worth more than $39 billion by 2015.
So what went wr...
“We are all safe”, I hear journalists cry, “What took them so long?” First of all, let's examine what HTTPS actually is.HTTPS is basically secure HTTP traffic, using SSL or secure sockets layer. Effectively, what this does is to encrypt communications between two points, these two points being your browser and the server.Now, SSL or HTTPS are no bad thing but it really gets on my wick to hear people proclaim that it makes something secure. Let's be very, very clear about this: it does not make ...
This is the title of a seminar run by ISC2, the organisation behind the CISSP, and it got me thinking.....
How many times do we see on local news, read in local papers, or all over the Internet, coverage of the latest computer-based scam to part you from your personal information?
The phishing email from a bank asking for your account details, mothers maiden name and the name of your favourite pet…or the plea from the last Prince of some turbulent African nation with an offer of large sums of ...