Commentary & Insight From S?nnet Beskerming
Covering news on emerging threats, advice on good security practices, analysis, explanation of technical news items, and brief, accurate, non-biased synopsis of security-focussed technology trends, S?nnet Beskerming commentary is many things.
Whether you call it a blog, online journalism, or commentary on events, this is where you can find and search all relevant articles published by S?nnet Beskerming.
All articles will eventually be made available free of charge, however some content is initially only available to paying subscribers.
Available entries
A Week to Stay Under the Blankets
Posted in: Information Security
To support the implementation of the Data Protection Act (1998), the UK has established a small body which is designed to audit and prosecute companies with respect to their compliance with the Act. The Data Protection Act was initially established to ensure that customers of UK businesses could mai....
Posted: 27 June 2005 12:00
Increasing Public Awareness
Posted in: Information Security
People are starting to get the message that there are risks involved with using public Internet connection terminals, such as those at Internet kiosks found at airports, Internet cafes, and public terminals at education institutions. Recently, a member of the Australian Federal Police's Cyber Crime ....
Posted: 20 June 2005 12:00
More Security Problems, and the Apple - Intel Move
Posted in: Information Security
This week is likely to be a shorter column than the last couple of weeks' have been. Leading the news this week is the switch from IBM to Intel for Apple systems. This switch was announced at the WorldWide Developers Conference (WWDC) held recently in San Francisco, and hinted at in last week's colu....
Posted: 13 June 2005 12:00
Bluetooth Insecurity and Apple - Intel Rumours
Posted in: Information Security
The Bluetooth protocol may not be as secure as once thought. In a paper that is due to be released in the next few days, a number of cryptographic researchers believe that they have discovered a method which allows them to hijack the communications between two Bluetooth enabled devices (such as a Bl....
Posted: 6 June 2005 12:00
Posts from November, 2024.