A rather interesting phenomenon has surfaced recently: skimming using a mobile phone. It is very simple to do this. Just take a picture of the front and back of the card and your done. The information printed on the card is enough to make purchases on for example poker sites and such where money easily […]
Read Full Post »
Posted in Security Architecture on Feb 7th, 2009
During the last months I have held quite a few risk workshops and one topic that always have arisen is if blackmailing and extortion actually is a threat to think of and handle when we look at information security. The first answer would be “No” but thinking a bit longer the answer could only be […]
Read Full Post »
Posted in Security Architecture on Feb 2nd, 2009
Durnig my last posts I have written quite much about Jericho as a security referense model. One question I have gotten several times is: “Is it possible to implement?” I have made several security reviews during the last year where I have looked into possible implementations of Jericho Style Security. Last week I had a […]
Read Full Post »