Δευτέρα 29 Δεκεμβρίου 2014

The Seven Deadly Sins in an Information Security Context

The seven deadly sins (a.k.a cardinal sins) is a classification of vices as part of Christian ethics, used to educate and instruct believers since early christian times. In the film Seven (1995), two detectives, a rookie and a veteran, hunt a serial killer who uses the seven deadly sins as his modus operandi. In this post, I will try to map the original seven deadly sins in the context of Information Securi...

Δευτέρα 22 Δεκεμβρίου 2014

Bureau-121

Bureau 121 (Unit 121 of the North Korean General Bureau of Reconnaissance) is the name of a secret cyberwarfare agency belonging to the military of North Korea. It is one of two such cyberwarfare units in the General Bureau of Reconnaissance, the other being No. 91 Offi...

Παρασκευή 19 Δεκεμβρίου 2014

Thank You, truly

New Year, new logo – InfoSecLeague has a brand new logo created by Truly Creatives

Πέμπτη 18 Δεκεμβρίου 2014

ENISA CERT training

ENISA has launched a new section on its website introducing the ENISA CERT training program. In the new section, you can find all the publicly available training resources and the training courses currently provided by ENI...

Τρίτη 16 Δεκεμβρίου 2014

Cyber Warfare: The Modern Theater of Operations

A great deal of debate circles around the concept of cyberwarfare – and definitions are rarely agreed upon. While some claim that cyberwarfare is the fifth domain of warfare (after land, sea, air and space) others simply claim that the term is an attempt at sensationalism. The increasing importance of cyberspace for military operations has led to the United States Department of Defense classifying it as the Fifth Domain of Warfare. However, cyberspace...

Σάββατο 13 Δεκεμβρίου 2014

POODLE Strikes Back

Recently surfaced a design vulnerability found in the way SSL 3.0 handles block cipher mode padding. The POODLE attack demonstrates how an attacker can exploit this vulnerability to decrypt and extract information from inside an encrypted transacti...

Παρασκευή 12 Δεκεμβρίου 2014

Diceware: Random Passphrase Generator

You hear all the time that it is crucial for your online security to build a strong password. We have previously outlined the guidelines for a "good" password but sometimes this is not enough. Applications such as e-mail and data encryption, bitcoin wallets and password managers require a grater degree of protection. Securing such applications with a long complex password might just not be enough. Hardly anyone can remember such a password and most...

Δευτέρα 8 Δεκεμβρίου 2014

Fraud, Corruption and Corporate Governance

Fraud and Corruption are like radiation. There are all around us, invisible, subtle and we usually aware of them, when irrevocable damage and sometimes total destruction arise. They use the “spider method”: Attract, Entrap, Devo...

Κυριακή 7 Δεκεμβρίου 2014

The Site's Security Certificate is not Trusted. Proceed?

When you visit a website whose web address starts with https, your communication with the site is encrypted to help ensure your privacy. When you navigate to a site that uses SSL to transmit data, the server which hosts that website presents your browser with a certificate to verify its identity. This certificate contains information such as the address of the website, which is confirmed by a third party...

Σάββατο 6 Δεκεμβρίου 2014

Practical Lollipop Security

Android 5 (a.k.a. Lollipop) introduced some really neat features that allow users to increase the level of security on their device. They include privacy, security and backup solutions for your device.

Τετάρτη 3 Δεκεμβρίου 2014

The Time Is Now for Information Governance. But Do You Even Know What It Is?

Information governance covers the entire spectrum of information management, but most people have a fuzzy notion of what it is. This must change, because the real value of information can't be fully realized unless it is properly govern...

Παρασκευή 28 Νοεμβρίου 2014

Imagine Never Being Alone

Someone looking over your shoulder, recording every computer keystroke; reading and listening to your private Skype conversations; using your phone’s microphone and camera to monitor you and your colleagues, without you even knowing ...

Δευτέρα 24 Νοεμβρίου 2014

The Ghost of Christmas Yet to Come

Attention holiday shoppers, beware of cyber criminals who are out to steal money and personal information. Scammers use many techniques to defraud consumers, from phishing e-mails offering too good to be true deals on brand-name merchandise to offering quick cash to victims who will re-ship packages to additional destinations. Previously reported scams are still being executed toda...

Security Impediments the Use of Electronic Transactions

European consumers show wary regarding online shopping and online transactions, despite the fact that, in recent years, both specific transaction categories indicate significant growth. Therefore according to

Παρασκευή 21 Νοεμβρίου 2014

Let's Make HTTPS the Standard and not the Exception

On November 18th, EFF announced Let’s Encrypt, a new certificate authority (CA) initiative that we have put together with