Archive for 'Security' Category

Mar 02 2011

How secure are the smart phones?

Published by under Android,Security

Somewhere between all the different activities that fill up a normal week, it is only acknowledging there is no time for everything and it will be a priority. Among all these different priorities there has been the purchase of a new mobile phone and it is only to admit that new technology is not always […]

Comments Off on How secure are the smart phones?

Feb 18 2010

I’m a Twitter – Please Rob Me!

Published by under Privacy,Security

Social media is today something most people use in one form or another; If it’s blogs, Facebook, LinkedIn, Twitter or whatever it may be. The discussion about personal integrity goes back and forth and culminated earlier around Swedish FRA and whether the government at all has the right to scan e-mail for information to protect […]

No Comments

Feb 03 2010

Sitic moved over to MSB

Published by under Security

The fact that the Swedish FRA, the National Defence Radio Establishment, is the Swedish national authority for Signals Intelligence isn’t taking over the Swedish IT incident centre, Sitic, can only be seen as something positive as this authority would very quickly just end up in negative discussion as its primary objectives which are to monitoring […]

Comments Off on Sitic moved over to MSB

Nov 08 2009

ThinkVantage Password Manager update for Firefox

Published by under Security

After waiting a long time for Lenovo to update the ThinkVantage Password Manager for Firefox v3.0 +, the only option seems to set itself down and adjust the extension to make it work. Until Lenovo itself publish its own update – an updated version of ThinkVantage Password Manager v2.0 is available and can be downloaded […]

Comments Off on ThinkVantage Password Manager update for Firefox

Feb 12 2009

Regulations, Standards and Guidelines

Published by under Security,Standards

The regulations, standards, and guidelines were the theme at the latest ISACA Malmö after work activity, where SIG Security members also were invited. The basic idea of the seminar was that Erik Ravinder and myself would give our views from audit and business perspective why regulations, standards, and guidelines are needed and where the difficulty […]

Comments Off on Regulations, Standards and Guidelines

Jan 25 2009

Time for change of legislation for breach notification

Published by under Security

Card fraud and skimming of cards is nothing new and the Malmo region has previously been reported by the Swedish police as the region in Sweden which has the highest rate of card frauds reported. But the question is whether it is not the time to rely on change and tougher requirements regarding the handling […]

Comments Off on Time for change of legislation for breach notification

Dec 12 2008

Malmo secures it’s position on Swedish national skimming list

Published by under Security

Malmö, Sweden has strengthens its position on the list of places with the greatest problems with hijacking and skimming of credit cards. Several Swedish newspapers write about the recent operation of the Malmö police, which applies to Toys R Us in Sweden, where it has uncovered sophisticated skimming equipment. While skimming of cards is nothing […]

No Comments

Jan 30 2008

Remote bank fraud against Swedish Swedebank

Published by under Security

Most people have heard about card skimming and other credit card fraud but in Swedish media, there are several interesting articles regarding how a local branch office to Swedbank manage to stop a fraudulent transaction in the last minute. The Swedish police won’t talk about it but media claims that a bank employee took notice […]

No Comments

Nov 04 2007

Smartcard for multiply operating systems

Published by under Security

Have you ever been trying to get commercial smart card solution available on the marked to work with more than just one operating system? Then you might be familiar with that it’s not a walk in the park to get it to work. During my evaluation of both hardware and software I quickly noticed that […]

No Comments

Nov 03 2007

MSN Hotmail – New King of Spam a lot

Published by under Security

Couple of month ago and after getting totally sick of all the spam in my mailboxes, so I changed the configuration and installed greylisting support on the mail server. So how does greylisting work? What happen is that each time a given mailbox receives an email from an unknown contact (ip), that mail is rejected […]

No Comments

Next »