» Listen or download now on the podcasts page » Machine-to-Machine (M2M) is a domain that includes industrial systems, telemetry, Scada and so on. And while Scada has increasingly become a focus of security concerns, this has tended to concentrate on the the control systems themselves, rather than the entire chain from sensor to control room. In this episode, we talk to… Read more »
In the popular American Football movie ‘Any Given Sunday’, a near burnt-out coach played by Al Pacino somehow digs out an inspirational half-time speech in a crucial game that turns his team’s fortunes and his own life around. His theme is that, in sport and in life, the gap between success and failure is measured in inches and you have… Read more »
Security is a business and those of us who make a living from it, in some form or other, effectively profit from the fact that vulnerabilities get exploited by bad people. But is there a moral or ethical limit to how you turn insecurity into money? ReVuln, a security company based in Malta, claims to have found nine zero-day vulnerabilities… Read more »
Apple’s solution to the Flashback trojan problem is an interesting one, even though I suspect it’s going to annoy some people. The firm has released three Java updates in rapid succession, none of which appear to fix the original flaw that made the Flashback trojan viable. But the third update did include a removal tool for known versions of the… Read more »
And so, with Flashback, Mac users finally have a significant piece of malware to worry about. From the tech news sites, you’d think that the sky is falling for users of Apple’s OS X. And, as usual, they’ve completely missed a more significant point – about how malware is changing. I’ve seen one estimate that puts the number of Flashback… Read more »