Slack Alice

Job title:
Columnist, Infosecurity

Areas of expertise:
News bites, gossip, naming and shaming, humour.

Biography:
'Slack Alice' is best known by her Slack Space column which is published in every issue of Infosecurity. The information security industry's equivalent of 'Gossip Girl', Slack Alice keeps you up to date with all of the latest news, gossip and scandal in the industry. 'Slack Alice' always welcomes your comments...

Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

All Bloggers » Slack Alice
0
comments
We’ve all been disappointed when a favorite show is canceled, be it Arrested Development, Freaks and Geeks or, more recently, 666 Park Avenue (err…or is that just me?). But Thailand’s National Broadcasting Commission (NBC) got more than it bargained for when it made the fateful de ...
Posted 14 March 2013 by Slack Alice
0
comments
It’s McAfee. James McAfee.
A game of high-stakes, technical espionage that targets the highest levels of government? A bevy of presumably beautiful female double agents? A nefarious foe bent on the destruction of the US, operating in the shadows under a cover of legitimacy? These are not the trappings of a new James Bond inst ...
Posted 05 March 2013 by Slack Alice
0
comments
Peter Fleischer, an American in Paris who is also Google’s Global Privacy Counsel, knows a bit about privacy and law. Writing in his own blog, he has warned Europe to expect a litigious explosion in a few years, with the new EC data protection regulation expected to come into force in 2015. S ...
Posted 23 January 2013 by Slack Alice
0
comments
Pirates in the Cloud
The FBI takedown of Megaupload one year ago was a PR fiasco, and quite possibly, a practical disaster for law enforcement and rights holders. The image of armed police storming a private function and holding a pregnant woman (Dotcom’s partner) at gunpoint – and preventing her calling for ...
Posted 10 January 2013 by Slack Alice
0
comments
False Positives and the Disposition Matrix
The bane of databases is the false positive – the inclusion of an entry that shouldn’t be there. For anti-malware databases, false positives are inconvenient: good software is blocked because it is believed to be bad. For human databases it can be equally inconvenient: a false positive i ...
Posted 20 December 2012 by Slack Alice
0
comments
Is Your Computer Photochromatic?
Earlier this year Google showed off its prototype for the long-awaited Google Glass, described as “a stamp-sized electronic screen mounted on the left side of a pair of eyeglass frames which can record video, access email and messages, and retrieve information from the Web.” The glasses ...
Posted 06 December 2012 by Slack Alice
0
comments
Apple’s Next Target? A Polish Grocer
Cult of Android, the online antidote to the online Cult of Mac, announced on September 13: “Ladies and gentlemen, I wish I was making this up, but unfortunately I’m not... They’ve actually filed a lawsuit against an online Polish grocery site…” The site’s Vincen ...
Posted 06 December 2012 by Slack Alice
0
comments
In Deep Space, No-one Can See You Surf
The web is often described as cyberspace. Hold that image, and then travel into deep space – the dark web. You might see what looks like Saturn, surrounded by rings. But look closer and you’ll find it’s a black hole protected by onion rings. Enter Tor (the name is an acronym for & ...
Posted 27 November 2012 by Slack Alice
0
comments
What's the Main Cause of Movie Piracy?
The main cause of movie piracy, says Scientific American, is movie makers themselves. DVDs are dying primarily because phones, tablets, netbooks and many new laptops simply don’t have a DVD slot. But if that’s where people get their entertainment, then how are they to view movies? Strea ...
Posted 27 November 2012 by Slack Alice
0
comments
How does Google use your information?
Following growing concerns on how the web giants Google are using it’s users information, they have launched Google Dashboard; a service which allows users with a Google account to view the information that Google has stored on them, It also allows users to delete any information that they wou ...
Posted 06 November 2009 by Slack Alice
1
comment
Ten Computer Hacks In The Movies
Some of the most successful blockbuster films released in the last two decades have been themed on the potential destruction that computer hackers can cause. Here are some of Hollywoods top hacking themed movies. Swordfish A secretive renegade counter-terrorist co-opts the world's greatest hac ...
Posted 29 October 2009 by Slack Alice
0
comments
How the US military has weaponised hacking
“Our technological advantage is a key to America's military dominance.  But our defence and military networks are under constant attack.  Al Qaeda and other terrorist groups have spoken of their desire to unleash a cyber attack on our country -- attacks that are harder to detect and ...
Posted 16 October 2009 by Slack Alice
0
comments
How common is the hacking of secure wifi?
Normal.dotm 0 0 1 279 1595 SEOptimise 13 3 1958 12.0 0 false 18 pt 18 pt 0 0 false false false /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle ...
Posted 16 October 2009 by Slack Alice
1
comment
The Linux/Windows debate is an oldie but a goodie, and there have been many long threads on most computer related forums discussing their relative merits. Linux is free, open-source and community based. Windows is expensive, professionally developed and has effectively held a monopoly over the sof ...
Posted 06 October 2009 by Slack Alice
0
comments
There's a well-known saying in information security that the weakest part of any computer system is the person using it. One area where this becomes abundantly clear is in the use of passwords. Allowing users to choose their own passwords can be fatal, with most people not having the first clue abou ...
Posted 06 October 2009 by Slack Alice
0
comments
When hacking is legal
The Merriam-Webster dictionary gives two different definitions of “hacker” related to computer security. A hacker is either “an expert at programming and solving problems with a computer” or “a person who illegally gains access to and sometimes tampers with information ...
Posted 06 October 2009 by Slack Alice
0
comments
Since the late 80s retinal scanning has been featured in a whole bevy of sci-fi and action films. It's been the security system of choice for some of the silver screen's top spies: James Bond used it in GoldenEye and Ethan Hunt in the Mission Impossible movies. As a result, whilst retinal scanning m ...
Posted 06 October 2009 by Slack Alice
0
comments
Early in 2009, Twitter suffered two major security lapses. Once when a wave of highly successful phishing campaigns were successful in obtaining a lot of Twitter passwords, and then again when an 18 year old hacker and student of computer games development brute-force'd an administrator account. In ...
Posted 05 October 2009 by Slack Alice
Showing 1 - 18 of 18 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×