General

Last Updated on 3 Feb. 2015, Total: 157 Blog Posts

  1. Online Email Privacy Tester

    Companies track their marketing campaigns in various ways like, in mass mailshots they add tracking images so that they would get more information about the users who have opened and read their marketing message. They collect users' information such as, IP addresses which help them determine the country, and client software which help them determine the type of operating system,... Read More

  2. Operation DeputyDog Analysis

    Operation DeputyDog campaign leveraged a zero-day vulnerability in Microsoft Internet Explorer... Read More

  3. Operations Engineer Guidebook

    The field of operations engineering covers a wide variety of topics. Ops School will guide you through all of these skill sets from beginner to expert... Read More

  4. Osterman Research Short Survey

    We are conducting a short survey with Osterman Research on key systems deployed in organizations of all sizes. If you are involved in messaging and related issues for your organization, we invite you to participate in this survey... Read More

  5. Passwords are not the bottleneck

    Passwords were and remain an important aspect of security in the financial sector, however, when you reflect on the whole scenario of financial mechanisms you might be surprised to find out that the impact of stolen passwords or compromised credentials is quite low in terms of financial losses. In fact, two researchers from Microsoft published a stimulating paper about this... Read More

  6. PayPal Persistent Mail Encoding Vulnerability

    The Vulnerability Laboratory Research Team discovered an input validation mail encoding vulnerability in the official PayPal Inc (Ebay) MainStreet finance service company website... Read More

  7. Penalizing success!

    What's going on in the UK? 'constant attacks on success; an absurd belief that fixed pay is a better system than variable pay and that politicians can determine what a "fair" wage is; the government's failure to deregulate labour markets; high income and other taxes; an energy policy which is killing manufacturing; the tax raid on the North Sea; an... Read More

  8. Phishing scam aimed at Facebook users

    A fake social media application aimed at Facebook users enticed users to enter their login credentials to gain access to the fake security app which promotes the security of their Facebook accounts and prevent them from being hacked. Users are reminded to never provide personal information such as, login credentials to unknown and unverified pop-up pages/screens, third-party apps, email requests,... Read More

  9. Predicting Long-Term Human Mobility

    Where are you going to be 285 days from now at 2PM?... Read More

  10. Procurement & Management of Cloud Services

    The European Network and Information Security Agency (ENISA), which was set up by the EU to carry out very specific technical and scientific tasks in the field of Information Security has published a practical guide about the procurement and governance of cloud services. Although, the guide focuses on the public sector, the content covered such as, service availability and continuity... Read More

Featured Links