Category Archives: Security Threats
USB KM switch for sharing Keyboard, Mouse, clipboard and transfer files
With this special USB cable, it is possible to use one Keyboard and Mouse to work with 2 computers (and with 2 screens). In addition, one can transfer files and share the clipboard. In Wikipedia, it is called “Easy Transfer … Continue reading
Insider Threat Report, 2015 by Vormetric
Vormetric has published a set of documents as part of the Vormetric 2015 Insider Threat Report. The research has been conducted by Harris Poll and analyzed by Ovum. Some short extracts are shown below. Worth to have a look. The … Continue reading
Global heatmap, by G4S Risk Consulting
Global Intelligence System (GIS) is providing an online service, including a Heatmap and Global forecast reports. There are forecast reports freely available, and they can provide short and concise information about current threats and hazards globally. Please see the links … Continue reading
Unintentional Insider Risk, report by Ponemon
Raytheon has published an interesting report called “The Unintentional Insider Risk in United States and German Organizations“, conducted by Ponemon Institute. Worth to have a look. Some highlights: IT practitioners agree unintentional employee negligence causes more security incidents than intentional … Continue reading
“Tiger in the cage” examples, bow-tie analysis as part of risk assessment
Bowtie analysis might be an helpfull tool for risk assessment. I used yEd to create my own bowtie (see the source at the end). Bow tie analysis in the ISO 31010. Bow tie analysis is a simple diagrammatic way of … Continue reading
Global Risks Report by World Economic Forum
The latest Global Risks Report 2015 by World Economic Forum is available . The report is based on an annual Global Risks Perception Survey. This is in interesting report and can be usefull when comparing different risks and when trying … Continue reading
POS malware, some links to material
Increasing number of attacks has been taken against Point of Sales devices and systems. There are several good overviews and materials on this topic, and those are revealing details of the technics used in these targeted attacks. Main sources PoS … Continue reading