Security behaviour is often put forward as the reaction of staff members when a security decision must be made, often bringing in the personality of the people and collective group in question. The personality generally has two main strands revolving
Stephen
A collection of 31 posts
Office 365: Shields up
Office 365 in general is a bit lax when it comes to default protection out of the box. I’ve found that a lot of malicious attachments come through in the form of js files, scr, zips, [insert next exploitable
SME Security
From personal experience – Information Security within SME’s varies drastically; from not a care in the world, to faking it, to making it. There is a great fear around Infosec within SME’s; and many misunderstandings around securing data, requirements
Implied Trust and the Lenovo Fiasco
In the past week Lenovo has been in the firing line from multiple angles; adware factory installed on their consumer systems, the injection of third party content into browsers, hidden root certificates installed on the systems, followed by the most
Web application security - Who tests the testers?
***Dislaimer: *This was disclosed to the vendor as of Early October 2014 and seems to be resolved as of the date of this post – 2014-11-13 as the method of executing the login bypass no longer works. I have worked with
Internet Explorer 8 - Cache Issues
Today i encountered an unusual problem with a client who use IE8 to use a legacy system which is browser specific. The Problem So errors such as the following occurred when using internet explorer. * “Internet Explorer was not able to
Avast! Forum Breached
Received an email this morning notifying about a breach with the Avast forum. Dear *, The AVAST forum is currently offline and will remain so for a brief period. It was hacked over this past weekend and user nicknames, user names,
Subscribe to TechFoundry
Subscribe today and get access to a private newsletter and new content every week!