This blog complements my book, The Essential Guide to Home Computer Security, to help you keep your home computers and smartphones secure.

Wednesday, 29 February 2012

New Mac malware exploits Java bugs, steals passwords

A quite sophisticated password-stealing malware on Macs. It would seem to be a drive-by download using Java bugs to get itself installed. Security updates should by now be blocking it, but it just goes to show that users can't be complacent about security, even on the Mac.

Monday, 20 February 2012

Geo-tracking can give away your photo locations

To keep your photo locations private make sure you turn off GPS tracking of photos in the "settings" on your smart phone. Location data can be embedded in the photos and easily accessible if, say, the photos are posted online.
Geo-tracking can give away your photo locations

Privacy shouldn't be an after-thought

There are a lot of privacy stories around at the moment especially in relation to social media. In information (cyber) security it is accepted practice to undertake a risk assessment, a key part of which is the potential impact of a security event. Unfortunately in both security and privacy those who feel the impact, the victims, are not necessarily those who perpetrate the loss. So there is insufficient economic incentive for those taking risks with our personal data to do it well. For me there are at least 3 arguments in favour of Privacy Impact Assessments (PIAs) which are proposed as a way forward:
1) To redress this balance and encourage more investment in privacy protection;
2) To provide guidance and help to organisations;
3) To ensure 'due diligence' is performed;
Of course if 'due diligence' becomes box ticking, or PIAs are seen as bureaucratic obstacles then these benefits may not be realised. Ultimately what we want to encourage is 'privacy by design' and this can only be achieved if the right risk analysis is performed ab initio.

A Useful Review of 3 Free Bootable Rescue Discs

Important recovery tools - extremely useful
A Useful Review of 3 Free Bootable Rescue Discs

Wednesday, 15 February 2012

(Yet another) Facebook malware scam takes hold

I could be posting a scam like this everyday! But it doesn't hurt to have a little reminder of the sort of things scammers will try to get you to click where you shouldn't. In this case it's a fake CNN site.

Sunday, 12 February 2012

Security flaw exposed in some home security cameras

Owners of some Trendnet cameras need to update their system. A major security flaw enabled cameras that were already set up to provide access over the internet, to be viewed by anyone without a password. Any software or setting used to provide remote access or sharing is always a risk and this flaw just shows that sometimes the insecurity can be out of our control.

Thursday, 9 February 2012

Demand for safety kitemark on software stepped up

I am not convinced that an EU NCAP style 5 star 'security rating' on software would be very practical but a rating for PCs might at least allow novice buyers to take security into consideration when purchasing.

Wednesday, 1 February 2012

Today is Change Your Password Day !

What a good idea! Change your password day. Lots of good ideas captured in this article and the others that it links to.

Nice Review of My Book

And I have had such a nice review of my book by a fellow infosec professional that I just had to link to it!