Latest Posts

Spitzer on the Move

In the first ever action taken by the NY State Attorney General against a purveyor of adware Elliot Spitzer filed suit yesterday against Intermix Media, Inc.

April 29, 2005 by Richard Stiennon

Comments

End of an era for viruses?

This article on the InfoSec show in London this week could be considered inflammatory. Claims of the end of viruses as a major threat are premature.

April 28, 2005 by Richard Stiennon

Comments

Pasta and Bank Thieves

If you happen to be in London attending the InfoSecurity conference and you happen to be staying in the Paddington area you can walk down Craven Road, turn on Craven Terrace and find yourself in front of the Taormina Ristorante Italiano. (named for a town in Sicily)I found myself here this evening and ducked in to sample their dish called penne pasta al dolcelatte which I always thought of as pasta gorganzola.

April 25, 2005 by Richard Stiennon

Comments

Hospital Surveilance on the Rise?

The FBI and other law enforcement agencies are looking into incidents in which people masquerading as unannounced inspectors were found poking around three hospitals in Boston, Detroit and Los Angeles.The article in the Washington Post is worth reading if you are involved in hospital administration or security.

April 24, 2005 by Richard Stiennon

Comments

DNS Poisoning. The Way to Riches.

It’s all about the money.Anyone who has heard my Threat Chaos presentation knows that it is my contention that all new threats have pecuniary motives.

April 22, 2005 by Richard Stiennon

Comments

Remembering Oklahoma.

I just want to make one point that the 10th anniversary of the bombing of the Federal Office building in Oklahoma brings to mind. For me it was the first breaking news that I heard over the Internet.

April 20, 2005 by Richard Stiennon

Comments

Internet 2 Rant

I have long criticized US academic institutions for lack of security. See my upcoming post: "Re-reading the Bill of Rights".

April 14, 2005 by Richard Stiennon

Comments

Computer Theft

We all know how computers are targeted for theft. The thieves grab the computers and sell them.

April 11, 2005 by Richard Stiennon

Comments