All it takes is one personAs we move the common denominator down to make web2.0 appealing, we run the risks of more social engineering attacks. There is so much technology out there, that trying to figure out how all of it works, and how all of it can be made to work safely is an entire industry vertical for information security.
RIAA Continues Pressuring ISPs For Information
The Recording Industry Association of America (RIAA) has been relentlessly fierce in its pursuit of individuals it deems as “criminals” by filing numerous lawsuits over the past several years.
It looks like the RIAA is trying to do all it can to encourage ISPs to be more forthcoming with identifying information in order to fuel their tactics which amount to little more than a legal means of extorting money from everyday citizens.
Good Information Security Resources
The month of Apple Bugs is just about over with, and the Month of Kernel bugs is over with, but still the zero day tracker keeps on plugging along and giving out some interesting information that is of a lot of use.
Google Reveals Confidential User Information?
While last week’s suggestion that Yahoo was switching browser preferences without explicit permission, was a black mark for the company, it doesn’t come close to the allegations that Google has revealed confidential information about its users.
Information Security – A People Problem
Interesting article out on outlaw about how information security is a people problem, which is something that we all probably really do know, even if we won’t really admit it all the time.
Malpractice in Information Security?
Interesting QA over at CSO Security Counsel today with Dan Greer trying to define what is information security malpractice, and the most interesting part is that today, we can’t define it.
Oracle Responds To Information Security Critics
Oracle the Database Company is taking time out on its corporate blog to address a number of critics on the security of Oracle Databases.
Information Security Fundamentally Broken
In May of 2006 I read an article by Noam Eppel on Security Absurdity, Why information security is broken, which can be downloaded here to read the original article.
Yahoo Tweaks Bidding Information
Yahoo’s Search Marketing will make some changes to the information made available to its clients, as they announce alterations to the Manage Bids pages during the transition to its new paid search service.
Managing Risk in Information Technology
As information technology increasingly falls within the scope of corporate governance, so management must increasingly focus on the management of risk to the achievement of its business objectives.