Protecting Your Gmail Account with Two Factor Authentication.

It’s not always obvious but your email account is one of the most important things you have on the Internet. (Jeff Attwood wrote a really good post about this back in 2008!) Your email account is like the keys to the city because when you sign up for just about any service on the Internet

Read More

Credit Where Credit Is Due

I’m probably not the first person to say this but i’d like to publicly applaud Susan “SBS Diva” Bradley for sharing the full details of her recent security incident It would have been very easy for her to have attributed the downtime to anything other that what actually happened, flattened the machine and start over

Read More

Security Vulnerability Research & Defense

When it comes to computer security most people are happy to ensure automatic updates is turned or WSUS is configured Some of us go a little further than that and make sure we’re 100% up-to-date on the latest patches and issues. If Susan’s blog inspires ONE person to rethink their attitude to patching it’s a step

Read More

Fasthosts, Stupid or Smart?

Fasthosts aren’t having an easy time of it at the moment. It was discovered in October their user database had been comprised. They did a couple of things to resolve the problem including getting in touch with their customers to inform them of the problem. At the same time they were asked to change their

Read More

If the experts are giving this sort of advice what chance do we stand?

Wireless security is something pretty important to us all. Most people understand that we need to make sure we’ve covered to stop other people jumping on the network (which your paying for!) However most end users / business owners don’t understand what to do to make them the most secure Why should they understand the

Read More

WEP Compromised Again

Please tell me your not using WEP for your wireless network? An article over on slashdot reports that the attack to discover WEP keys has been optimised even futher and that a 104-bit key can be discovered using only 40,000 captured packets. Even further the key can then be cracked very quickly (about 3 seconds!)

Read More