Welcome! 

My new blog has been launched today. This is intended to be a compilation of musings and thoughts with a rough focus on security and privacy. The idea is to provide analysis, commentary and geekspeak translations of news, events, and happenings in the security and technology arenas.

Feel free to comment and reply, the idea is to dialog.

You can read new posts on this blog via the RSS feed.

-J-

Musings - Geek speak elucidations

Boom! April fools!?

03/26/2009 11:52
As the warm weather begins to set in, something besides April showers may be approaching. A malicious program called Conficker (a.k.a. Worm_DownAD.AD, Trojan.Win32.Pakes.lxf, W32.Downadup) has been propagating throughout the internet and making headlines. This malware (malicious software) has...

Internet pain reliever…

03/02/2009 09:49
One of the primary goals of Information Security is to maintain the availability of information, and this month we will be discussing the availability of your internet connection. With lower costs and increased throughput, the internet is more of a vital business tool than ever. So just how painful...

Backing up is hard to do...

01/30/2009 10:27
Have you ever experienced the nauseating sensation of data loss? If so, you are most likely a firm believer in backing up your information. Whether it was a deleted proposal that could have save you hours of work, or a presentation that someone wrote over, or a hard drive that died, there is no...

Some Un-jolly Tidings...

12/31/2008 19:49
With the holidays here, there are many not-so-jolly “traditions” that are percolating through the internet. Specifically, we are focusing on the social engineering attacks frequently referred to as a confidence trick or as a con. A con is the basis for a number of online or computer...

In whom do we trust?

11/21/2008 13:40
It’s one thing when private and personal information is breached through accident, theft, or the occasional cracker hacking the systems. While damaging, these occurrences can be defended against and the risk can be mitigated and managed through various means. That being said, it is quite another...

Hunting the Elusive Email...

11/06/2008 10:20
Litigation is an unpleasant fact of life for many businesses and it now has serious Information Systems implications. E-Discovery (Electronic Discovery) rules shine a very bright spotlight on your Information Systems policies and procedures, and how well they are implemented. The policies,...

Survival of the Adminless

09/30/2008 15:41
Just how dependent is your organization on your computer/network/systems administrator(s)? I like to think that all administrators are a Nietzschesque breed of super-humans who never get sick, hit by busses, retire, win the lottery, take other jobs, or quit. Unfortunately, statistics show...

The Authentication Factor

07/15/2008 09:58
With the increasing sophistication of malware and other security threats, it has been obvious for quite some time that the standard “locks” we are using to secure our information may not be up to the task. The venerable “username and password” combination is generally used for everything...

Security insecurity: How concerned should you be?

05/28/2008 11:53
Information Security cannot be achieved with just a device or program, but must be embraced as a foundation for building your organization. These days, it’s not only giant multi-national conglomerates that are experiencing security issues with hackers, viruses or breaches. Increasingly, it’s small...

Seen the spammer, and he is us

04/10/2008 21:10
Ever wonder where that spam comes from? It could be coming from you… Many computers that become compromised with malicious software (also called malware: viruses, worms, spyware, etc.) are not being infected in a way that most people would think. Their hard drives remain intact, they aren’t...
<< 1 | 2 | 3 | 4 >>

Rants - Tech savvey explications

IE 0 Day Exploit

12/12/2008 19:27
Microsoft reported a new "zero-day exploit" that affects most versions of the Internet Explorer browser. A zero-day exploit is a security vulnerability that is being exploited before the software vendor or public know that the issue exists. This particular exploit attacks flaws within Internet...

Spoofed NDR issues

04/14/2008 13:05
We've seen a rash of NDR (non-Delivery Response) floods happening to our clients. In all cases, it appears that the spam being NDRed is spoofed, but we are receiving reports from these users that they are being black listed on spam filters. Is anyone else seeing this problem? Thanks, -J-