Site Network: Beskerming.com | Skiifwrald.com | Jongsma & Jongsma

Innovation in Information Security

Coverage of important Information Security and Information Technology news and events from the research team at S?nnet Beskerming.

Username: | Password: Contact us to request an account

Commentary & Insight From S?nnet Beskerming

Covering news on emerging threats, advice on good security practices, analysis, explanation of technical news items, and brief, accurate, non-biased synopsis of security-focussed technology trends, S?nnet Beskerming commentary is many things.

Whether you call it a blog, online journalism, or commentary on events, this is where you can find and search all relevant articles published by S?nnet Beskerming.

All articles will eventually be made available free of charge, however some content is initially only available to paying subscribers.

Available entries
Media Caught Out By Fake Press Release
Posted in: Information Security
News organisations seem to like complaining about the apparent lack of respect that the wider community is paying them, mainly about people wanting to keep reading their news for free. When challenged about their slipping standards of reporting and failure to provide actual news, many of these news....
Posted: 22 October 2009 22:45

Six Years of Microsoft Monthly Patches, Many More to Come
Posted in: Information Security
It has been pointed out by a some commentators that this month marks the sixth year of Patch Tuesday, the day that Microsoft releases their Security Bulletins (the second Tuesday of every month). In that period there have been around 400 individual bulletins released, with more than half attracting....
Posted: 22 October 2009 22:15

Strange Bug Plagues Apple OS
Posted in: Information Security
News is spreading rapidly about a serious flaw affecting Apple's latest Operating System, Snow Leopard (OS X 10.6), first being made public in early September on Apple's Discussion boards. The timing for this widespread coverage is unfortunate, given the massive patch release from Microsoft with th....
Posted: 15 October 2009 14:06

FTC Moves to Ensure Compensated Reviews Are Clearly Identified
Posted in: Information Security
A recent decision by the FTC is going to require online content providers to explicitly disclose any payment or goods or services that they have received in return for providing a review on a product, and ensure advertisers can not present dramatic results and then claim that results aren't typical.....
Posted: 12 October 2009 11:29

Charging for Online Content Won't Make it Any More Accurate
Posted in: Information Security
Attempts to get consumers of news to pay for what they are reading continue to stumble ahead. We have already covered previous announcements from News Corporation that they will be making their online content fee based, and the challenges and struggles that they and other content providers face in ....
Posted: 12 October 2009 10:50

Major Phishing Attack Reports Surface in October
Posted in: Information Security
Several years ago the average computer user would not have been expected to know that phishing, identity theft, or any number of Information Security issues existed, nor how important they actually were to staying safe online and in everyday life. With the almost constant public reporting in the in....
Posted: 12 October 2009 00:17

Microsoft Security Patch Release October 2009 Advance Notification
Posted in: Information Security
Microsoft have released their Advance Notification for the patches that are expected to be released this coming week with the October Security Bulletin Release.

It's not going to be Friday the thirteenth (that's next month), instead it will be Tuesday the thirteenth that will see thirteen bulleti....
Posted: 11 October 2009 11:57

Reddit XSS Demonstrates a Problem That Won't Go Away
Posted in: Information Security
Even after all the years of awareness, Cross Site Scripting (XSS) is still a problem that can bring major sites to their knees and can lead to much worse results for a site's end users when it is used in a blended attack to obtain authentication credentials, spoof legitimate content, or some other f....
Posted: 1 October 2009 18:20

Posts from November, 2017.