Archive for April, 2012

What is a Hacker Tool and how do you ban it?

April 25, 2012

What exactly is a hacker tool? The answer to this question depends on who you ask. To McGyver it would probably everything, to a hacker it would be any suitable tool and to a politician it would be anything that cannot be easily understood. The English Wikipedia has no entry on hacker tool. So what […]

Tags: , , , ,
Posted in Discussion, Internet, Stories 2 Comments »

Let’s talk about War

April 17, 2012

Extreme situations, entropy eruptions and unforeseen problems caused by complex interactions between a plethora of components are prime story material. You can use it in (science) fiction, you can use for breaking news, you can use it for scaring your children, you can use it for advertising and you can use it when talking about […]

Tags: , ,
Posted in Discussion, High Entropy, Stories Comments Off on Let’s talk about War

Pattern, Matching and IT Folklore

April 15, 2012

Every once in a while there is a lively discussion about the efficiency of pattern-based security measures. Usually you see these discussions in the wake of security software tests. Mostly it concerns intrusion detection, malware filter or spam filter tools. As soon as you are trying to implement filters or detection, you will need some […]

Tags: , , ,
Posted in Discussion, High Entropy, Security Comments Off on Pattern, Matching and IT Folklore

Simple Questions, Security Design, Details and Assumptions

April 3, 2012

A few days ago we received a call from a journalist who was researching for an article about a system about parking place management. Motorists have a hard time finding a place to park in busy urban areas. This is why Austrian researchers thought of fitting street lamps with cameras that monitor parking areas. The […]

Tags: ,
Posted in Security, Stories Comments Off on Simple Questions, Security Design, Details and Assumptions

DeepSec 365 Conference Track and Disinformation

April 2, 2012

We admit. We could not resist. Bazinga! Writing articles to be published on 1 April is fun, and you probably should not read any news on this day (or blog articles or anything, don’t even talk to people until 2 April). If you consider the disinformation practised on All Fools’ Day and connect it to […]

Tags: , , ,
Posted in Misc, Stories Comments Off on DeepSec 365 Conference Track and Disinformation

DeepSec Announces DeepSec 365 Conference Track

April 1, 2012

IT security has grown into a cornerstone of our modern society. We rely on data integrity, availability, and we do not wish our personal or business data to be mirrored on pastebin.com or other web sites. 2011 has been full of high-profile security-related incidents. 2012 will most certainly continue in this fashion. This cannot go […]

Tags: , , ,
Posted in Administrivia, Conference, High Entropy Comments Off on DeepSec Announces DeepSec 365 Conference Track