Commentary & Insight From S?nnet Beskerming
Covering news on emerging threats, advice on good security practices, analysis, explanation of technical news items, and brief, accurate, non-biased synopsis of security-focussed technology trends, S?nnet Beskerming commentary is many things.
Whether you call it a blog, online journalism, or commentary on events, this is where you can find and search all relevant articles published by S?nnet Beskerming.
All articles will eventually be made available free of charge, however some content is initially only available to paying subscribers.
Available entries
Dealing With People Who Avoid Restrictions
Posted in: Information Security
Whenever restrictions are imposed on people, stopping them from carrying out certain activities, or trying to restrict their access to information, there will always be a portion of the population that goes out of their way to avoid and defeat these mechanisms in order to access what is being blocke....
Posted: 22 June 2009 20:20
Microsoft Money Joins Encarta on the Scrapheap
Posted in: Information Security
Following their decision earlier this year to cut Encarta from their product line, Microsoft have announced that they will be ceasing production and sale of Microsoft Money (now Microsoft Money Plus) from June 30 this year. Affected products are all of the Microsoft Money family (Essentials, Plus D....
Posted: 11 June 2009 22:38
Critique of Apple's Security Stance Nothing New - But Still Worthwhile
Posted in: Information Security
Apple is a company that is notoriously secretive about their internal security processes and, although they have become more open about acknowledging the source of bugs reported to them when they fix them, they remain steadfastly tight-lipped at almost all other times when it comes to discussing sec....
Posted: 11 June 2009 01:01
T-Mobile Responds to Hack Claims - Nothing to See, Please Move On
Posted in: Information Security
Following on from our recent article on a claimed successful attack against the telecommunications giant, T-Mobile, it appears that the situation still remains a little murky, with reports claiming that the company has both confirmed and denied that a breach took place.
Ignoring for a moment the ....
Posted: 11 June 2009 00:32
Claims of T-Mobile Hack Raise More Questions Than Answers
Posted in: Information Security
Claims have been made by an unknown party that they have compromised the US cellular network carrier T-Mobile and have managed to extract all of the corporate data, including databases, confidential documents, scripts and programs from company servers and full financial data up to the present time.
Challenging Security Researchers and Coming off Second-Best
Posted in: Information Security
Challenging the security community to do something that you are basing a core part of your business on is always a risky move. It is something that you really need to get right the first time, or else it is going to be quite an embarrassing experience and is likely to cost reputation if news of the....
Posted: 7 June 2009 17:41
Google Finds More than 4,000 Malware Distributing Sites
Posted in: Information Security
Google's Online Security Blog published some information regarding the number of potentially malicious sites that appear to have been set up for distributing malware. Of the more than 4,000 sites that they have identified, more than a quarter are registered under a .cn hostname and there were sever....
Posted: 7 June 2009 17:40
Microsoft Security Patch Release June 2009 Advance Notification
Posted in: Information Security
Microsoft have released their Advance Notification for June 2009, with ten patches being identified for release next Tuesday.
Six patches, for Windows (2), Internet Explorer, Excel, Word, and Office have been rated as Critical, with the remaining four, for Windows, being rated as Important. From....
Posted: 5 June 2009 13:27
Posts from October, 2024.