Roundup of recent postings to Unscrewing Security

Damn, I really need to set up some sort of auto-cross-posting facility…

“Podcasts and Videos for the bored Security Geek”

Podcasts and Videos for the bored Security Geek

fill your brains with audio-visual security goodness

“So, you go to the gym and work out, listening to security podcasts… ?”

“Yes, yes I do.”

“Like the Universe, Cyberspace is boundless…”

Like the Universe, Cyberspace is boundless…

…therefore might we spend an infinite sum of money on it?

Last Thursday I attended the British Computer Society Meeting the Cyber Challenges of 2012 conference. Over the course of the day there were some epic quotes – to give a flavour:

  • “You have a cryptographic failure, and then the terrorists take advantage of it, and then there’s a bomb…”
  • “If a UAV is being used for crowd control and it falls on someone, it could kill them”
  • “You need to write good software.”
  • “Security people find it difficult to talk about [some topics because] they fear they may compromise something” – a statement with which I disagree strongly, in fact it’s hard to get them to shut up
  • “the British Business Federation Authority [wants to start an] Application Authentication Policy Management Authority”
  • “I had a word with an investment banker … and he reckoned that if all his trading desks all failed, he’d save money” – regards disaster recovery

“#Practical #Dropbox #Security #Advice”

#Practical #Dropbox #Security #Advice

How about checking your security settings?

Everybody loves Dropbox – but I was wondering how long it would be before somebody posts an exposé – and thus Derek Newton writes in his blog:

Under Windows, Dropbox stores configuration data, file/directory listings, hashes, etc in a number of SQLite database files located in %APPDATA%\Dropbox. We’re going to focus on the primary database relating to the client configuration: config.db. Opening config.db with your favorite SQLite DB tool will show you that there is only one table contained in the database (config) with a number of rows, which the Dropbox client references to get its settings.

“The Security Backlog”

The Security Backlog

All the stuff that I should have covered whilst wishing I was dead

Everything was going so well at Dunhacking, but a dodgy Brick Lane curry eaten at the a market stall whilst attending LinkedGov Hackcamp flattened your correspondent for 10 days, and since then the backlog has been too terrifying to address properly.

So let’s address it improperly instead.

“The War On Information Access”

The War On Information Access

If we can’t ban it, we’ll stop you getting at it

Information is only useful when it can be accessed at which point it becomes something entirely othermusic, video, evidence, or even knowledge – and to do this there is a three-step process:

  • You discover the information – by word of mouth, a shared forum, inspired use of a search engine, or plain luck…

Leave a Reply

Your email address will not be published. Required fields are marked *