Feed on
Posts
Comments

Monthly Archive for August, 2011

F-secure published an article today on how they found the mail and file used to hack RSA. A quite simple hack using social engineering and a standard Trojan named Poison Ivy using a zero day exploit, CVE-2011-0609. The article has an interesting video showing what happens from a user perspective when the computer becomes infected. […]

Read Full Post »

Having worked with security and compliance schemes for many years I still find it very challenging to motivate why a client should invest in fulfilling any type of compliance, besides the obvious one: You have to. But as everyone knows a rule consists of three parts: The rule, the monitoring of rule fulfillment and the […]

Read Full Post »