Category Archives: Security

PbD, Privacy by Design concept

http://privacybydesign.ca is the main place for Privacy by Design concept. “Privacy by Design (PbD) represents a significant shift from traditional approaches to protecting privacy, which focus on setting out minimum standards for information management practices and providing remedies for privacy … Continue reading

Posted in Security Management, Security Standardization and Practises, Security Training, Awareness and Reports | Comments Off on PbD, Privacy by Design concept

Ransomware included in Top 5 Security Predictions for 2013, by Symantec

Ransomware Symantec has published report/whitepaper “Ransomware: A Growing Menace“. This malware is highly profitable, with as many as 2.9 percent of compromised users paying out. An investigation into one of the smaller players in this scam identified 68,000 compromised computers … Continue reading

Posted in Security News, Security Threats, Security Training, Awareness and Reports | Comments Off on Ransomware included in Top 5 Security Predictions for 2013, by Symantec

Money Behind the Malware, and security training tools by Sophos

Sophos can published a good information for learning more about malwares today. For example, the document on Exposing the Money Behind the Malware: How cybercrime works and what to do about it (direct link to pdf) It introduces concepts like … Continue reading

Posted in Security Training, Awareness and Reports | Comments Off on Money Behind the Malware, and security training tools by Sophos

Trend and Risk Reports, by IBM X-Force

IBM X-Force is regularly publishing Trend and Risk Report. According to their own definition: The IBM X-Force Trend and Risk Report is produced twice per year: once at mid-year and once at year-end. This report provides statistical information about all … Continue reading

Posted in Security Management, Security Training, Awareness and Reports | Comments Off on Trend and Risk Reports, by IBM X-Force

Unfortunate and Commonly used Passwords

Studies reveal that people can be careless and lazy (?) when selecting their passwords. Scary Logins: Worst Passwords of 2012 1 password 2 123456 3 12345678 4 abc123 5 qwerty 6 monkey 7 letmein 8 dragon 9 111111 10 baseball … Continue reading

Posted in Security Training, Awareness and Reports | Comments Off on Unfortunate and Commonly used Passwords

General Documents and Guidance on Security, by US-CERT

US-CERT’s Security Publications site contains good introduction and guidance material around computer security for any user. General Documents Securing Your Computer Recovering from an Attack General Internet Security Technical Documents The site also provides links to their other pages, worth … Continue reading

Posted in Security Training, Awareness and Reports | Comments Off on General Documents and Guidance on Security, by US-CERT

New set of International Telecommunications Regulations (ITRs), WCIT-12

Next World Conference on International Telecommunications (WCIT-12) have ITRs (International Telecommunications Regulations) on their agenda. Updates can be expected on Human Rights, Security, Privacy, Critical Infrastructure and etc. areas. For more information, see WCIT-12. From WCIT-12: This landmark conference will … Continue reading

Posted in Cybersecurity, ICT News, ICT Organizations, ICT Standards, ITU-T, Privacy, Security Standardization and Practises, Telecom Security | Comments Off on New set of International Telecommunications Regulations (ITRs), WCIT-12