Author: j4vv4d
Cynics and Aliens
It's important that products and services undergo security testing before being released... but there are times when the business has legitimate reasons for bypassing protocol. It sometimes pays to be a bit more business savvy.
Life of a Worm
This is a story of a computer worm, from the time it was coded and deployed onto the internet. It is narrated by the worm in first person Zero day I am a worm. Well that’s what Richard, the programmer with the BMI of 38 who coded me says. He named me Clarice, after a … Continue reading Life of a Worm
Security Vs Compliance
Why do people focus on compliance and believe it’s security?
Benefits of CISSP
A Certified Information Security Systems Professional or CISSP, is an information security certification which a lot of security people have (obviously). But there are some extra benefits of having the certification… as explained in the video.
Phone Hacking
If you're unable to put a password on a device and someone gets into it... don't call them a hacker. Because there is no such thing involved.It's like your home, lock your door and windows, or even an unskilled burglar will be able to get in.
Journey of Team Cynic–The Cynics Cut
The extended version of journey on the White hat Rally to raise money for Childline from England across France, Switzerland and Italy.
Who the f*&^ are you?
After I explained to someone that I worked in Information Security, they commented, “well there’s not much you guys do given all the hacking that’s gone on lately.” Deep breath. Control pulse. Be calm. I could have just explained how a lot of the so-called hacking attacks were actually DDOS. Or the fact that human … Continue reading Who the f*&^ are you?
Don’t lose customers after a breach
So your company has just suffered a data breach. You’ve done what you can, offered the public apology, sacrificed your CISO and promised everything will be alright. But there’s a problem. Your competitors are taking advantage of your weakened state and swooping in on your customers, wooing them with offers too good to resist and … Continue reading Don’t lose customers after a breach
Deciphering Marketing Material
I always used to think I was perhaps not clever enough to fully grasp the marketing emails that cutting edge security companies send me… until I realised they were encrypted using an ancient cipher. I have now managed to decrypt and fully understand what they are saying: Dear Cynic, We have an exciting new breakthrough … Continue reading Deciphering Marketing Material
