Cybersecurity

Anniversary of the NSA revelations

This week marks the year of Edward Snowden NSA revelations began. I have covered news on NSA relevations on my blog pretty much (Security trends 2013 and Security trends 2014). Register magazine article NSA: Inside the FIVE-EYED VAMPIRE SQUID of the INTERNET is a good wrap-up of what has been revealed over the years and

Creating Secure Software for Linux

Are you writing software that needs to be secure? Quite probably. Security critical programs include application programs used as viewers of remote data, web applications (including CGI scripts), network servers, and setuid/setgid programs.  Secure Programming for Linux and Unix HOWTO — Creating Secure Software on-line book provides a set of design and implementation guidelines for

The NSA Archive

The suspicions the National Security Agency has gone far beyond its mandate of gathering information for counter-terrorism and foreign intelligence purposes were confirmed when, on June 5, 2013, The Guardian released the first in a series of documents provided by Edward Snowden detailing the NSA’s unlawful spying activities. The American Civil Liberties Union (ACLU) has

Home Routers a Big Consumer Cyberthreat?

Home routers and firewalls are supposed to make users easy and safely connect many devices to their Internet connection. Those devices were advertised to make your Internet safer. In many cases they helped, but more and more often they itself be a real security problem. Strange but saddly true. Home Routers Pose Biggest Consumer Cyberthreat

Cybersecurity framework for critical infrastructure

White House pushes cybersecurity framework for critical infrastructure article tells that U.S. President Barack Obama’s administration has releases a new cybersecurity framework. It aims to help operators of critical infrastructure develop comprehensive cybersecurity programs. It tries to drive changes in the way organizations deal with cybersecurity, which is not always in good shape based constant flow of

My firewall was a security risk

Diffrent DNS vulnerabilities and DNS amplification attacks have been on network security news lately. Yesterday I got e-mail from my ISP Elisa that I had an open DNS server running on my Internet connection, and it should be immediately disabled (someone had reported on problems with this). I was wondering what was happening, because none

HTTP security headers

I just some days ago checked some interesting articles on HTTP security. It really seems that I should look more into those HTTP security headers. 4 HTTP Security headers you should always be using article tells that because HTTP is an extensible protocol browsers have pioneered some useful headers to prevent or increase the difficulty