Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

0
comments
Mac Phisheries
I recently came across a Kaspersky report – Apple of Discord – by Nadezhda Demidova. Primarily, it’s about a dramatic rise in phishing attacks directed at those of us who use Apple devices (presumably including Macs as well as iOS iGadgets). According to the report, Kaspe ...
Posted 10 July 2013 by David Harley
0
comments
Facebook, Twitter, Apple and Microsoft: all icons of the information technology industry and all the focus of targeted attacks in Feb 2013. The bad news for us all is, that even those that should be some of the most tech-savvy companies in the world, can fall foul of targeted attacks.   Micro ...
Posted 01 March 2013 by Bob Tarzey
0
comments
Apple’s Next Target? A Polish Grocer
Cult of Android, the online antidote to the online Cult of Mac, announced on September 13: “Ladies and gentlemen, I wish I was making this up, but unfortunately I’m not... They’ve actually filed a lawsuit against an online Polish grocery site…” The site’s Vincen ...
Posted 06 December 2012 by Slack Alice
0
comments
By Cesare Garlati Adapt, accept and manage: a BYOD mantra for corporate IT RIM and Apple: two firms with more contrasting current fortunes you could not wish to imagine. The once high-flying Canadian BlackBerry-maker, for so long the darling of IT managers and beloved of time-starved execs the w ...
Posted 31 October 2012 by Cloud Security Alliance (CSA)
2
comments
Lunch with Cryptography Research
On Friday, I had lunch with Ken Warren, marketing director, Cryptography Research (CRI). There was no topic agenda (just the way I like it) and we had an informal and enjoyable lunch, with conversation dancing around social networking, consumerisation, and some pretty serious concerns around count ...
Posted 21 August 2012 by Eleanor Dallaway
0
comments
Apples and Oranges = Apple and Microsoft?
Several people have asked me for a response to Eugene Kaspersky’s views on Apple, as expressed at Infosecurity Europe last week, suggesting that Apple is ten years behind on security. But having spent some time on an analysis that no-one has used, I guess I’ll use it here – it ...
Posted 02 May 2012 by David Harley
0
comments
Kevin Townsend asked me for my opinion on iGadget jailbreaking, in the light of the recent release of Absinthe, a jailbreaking tool for the iPhone 4s and iPad 2. As a result, I’m quoted in a useful article for Infosecurity magazine here that also includes quotes from luminaries such as David E ...
Posted 23 January 2012 by David Harley
0
comments
Now You See It, Now You Don't...
Apple security, that is. Clearly, the company's hiring of a product security manager carries a very clear "we need to improve" message, but it's clearly tied to a marketing and IP problem with its much publicized habit of losing prototype iPhones: hat tip to the New York Times and Ni ...
Posted 07 September 2011 by David Harley
0
comments
Shhh!!! No Roaring in the Library!
It may lack drama after all the excitement of BlackHat (which is my excuse for not having noticed it earlier), but Apple QuickTime 7.7 fixes a stack-based buffer overflow issue that was flagged officially back in April 2011, as described on the National Vulnerabilities Database entry  ...
Posted 19 August 2011 by David Harley
0
comments
Not with a Bang, but a Whimper
The high-profile security conference season is usually enlivened with a few Mac attacks, Apple app attacks, and other euphonious assonances. While the most consistent source of such diversions is probably CanSecWest, BlackHat and Defcon often have some interesting harvesting from the Apple orchard t ...
Posted 10 August 2011 by David Harley
0
comments
One-sided Explosion
Consumerization – the use of consumer products within the corporate environment, is one of the more challenging issues for security teams to deal with. While a standard, well-defined, and well-protected infrastrucutre is a nice idea, there is more and more pressure to open up the network ...
Posted 09 September 2010 by Geoff Webb
Showing 1 - 11 of 11 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×