Posted on 01 September 2011 by Thales DIS
According to this article from USA Today last week, cyber-attacks are set to increase over the remainder of this year due to the widespread availability of a new SpyEye hacker toolkit. The software allows hackers or cybercriminals to control a network of up to thousands of botnets, which can then be used for spamming, DDOS […]
Posted on 02 September 2011 by Thales DIS
The Internet can be a scary place or so I was told repeatedly during my PC gaming days. It was often difficult to explain to people the draw of an online community or the satisfaction of tackling a challenge with like-minded gamers. The people on the other end of maze of Ethernet cables weren’t real, […]
Posted on 07 September 2011 by Thales DIS
My final installment in this series features the security of a player’s online persona or assets. If you’ve ever played a game that involves accomplishments or accumulating items, you know how much you care about this layer of security. No one wants to wake up one morning, log in to World of Warcraft and find […]
Posted on 15 September 2011 by Thales DIS
Bruce Schneier’s recent post in which he said that secret questions had reached a ‘new low’ may have shocked some casual observers, but for me it simply underlines a problem which is all too common. Personal verification questions (PVQs) and answers have been the de facto solution for forgotten passwords since the creation of email […]
Posted on 20 September 2011 by Thales DIS
Recently, @briankrebs highlighted a Trojan attack which showed quite how sophisticated some cyber attacks are now becoming. The case in question is being investigated by German police, and involves a new piece of malware which convinces online banking customers to willingly transfer their own money into the accounts of criminals. This particular case shows that, sometimes, even a layered […]
Posted on 21 September 2011 by Thales DIS
We’re shortly going to be researching CIOs globally on their views on security and authentication. What their concerns and pressure points are, what the barriers to implementing stronger security seem to be and where responsibility for security sits within an organization. However, we’d like YOU to pose the questions.
What would you ask?