Blog

Help – my web service has been hacked! What do I do?

By on Nov 2, 2013 in Blog

So you’re going about your day as normal, and then you notice something awry. This can happen on your website, web service, or user accounts (including email, social media, and so on). No matter what the case, here are some bad signs that your web service has been hacked: You cannot access your website or user account. Your website / webpages are defaced. Your...

Read More

There is no such thing as a “safer” web browser

By on Nov 2, 2013 in Blog

Some people take their web browser choice seriously. Other people working in a corporate environment will often bemoan their lack of choice in web browsing. Of course your personal preferences can come down to any number of factors – but if you’re making your choice based on the idea that one browser is “safer” than the others – then we have some interesting news to...

Read More

Securing Your Email – or Why You Should Stop Using Free Email Services for Business

By on Nov 2, 2013 in Blog

Email is tragically insecure. There is simply no way around it – and if you’re using free email services such as Google Gmail, Yahoo Mail, or Microsoft’s Windows Live Hotmail – you are leaving yourself far more exposed than you might realize. The problem with email security is that the system is inherently designed to facilitate quick communication between anyone...

Read More

We’ve put together a massive list of infosec / compsec resources for your reading pleasure.

By on Nov 2, 2013 in Blog

SCWOA has launched a new free reference site – called Deploy6 – for people serious about their security, or would just like to know more about security issues in general. There’s lots of links and publications to peruse, especially if you’re curious about some of the US government legislation that affects how security (should be) handled by organizations in...

Read More

The 12 Immutable Laws of Information and Computer Security

By on Nov 2, 2013 in Blog

As active technology security professionals, we regularly deal with a variety security issues that arise from various causes. While sometimes these security breaches are due to a product flaw – more often than not the real reason for a security breach comes from natural human error, or a lack of knowledge about good security practices (note: this isn’t an...

Read More

The solution to a mathematical problem could render all public key cryptography obsolete – should people and businesses be worried about the “Cryptopocalypse“?

By on Nov 2, 2013 in Blog

Last month there was a presentation at the Black Hat conference that warned us of a “factoring cryptopocalypse” – where factoring numbers and solving the discrete log problem become easy, rendering two of the most common encryption methods currently used (RSA and DH) practically useless. The consequences of such an occurrence are profound, because any data encrypted...

Read More