One can hit your information by accident he won’t make much damage. Whatever the attacker’s profile (and you can imagine other profiles combining two or three of the basic ones) be sure no one act rashly and without preparation. No…
6 ways to getting rid of SPAMs
We all receive, nearly everyday, poisoning emails. They are bothering us, make us lose time and, such as cuckoos, lay undesired eggs in our computers. What can we do to get rid of them? What is it? A small…
No one will be spared!
It’s true and we’ll see it. It’s because insecurity is great that we must react, not getting discouraged and preparing ourselves for the storm. Doing nothing is the surest way not to survive! What happened in the Warsaw airport on…
One… Two… Three… Cypher!
Cryptography existed far before the computer. The ENIGMA* case during the Second World War is a good example. The first uses date back to more than 2000 years. To hide the meaning of a text – and doing so making…
Should we accept or reject the cookies?
Here are 4 questions you have to answer: What is it used for? What is it? Is it dangerous? What should we do with it? After, it’s up to you to decide. What are the cookies used for? Cookies aren’t…
The 5 key questions to ask on your information
Why would you care, and get tired for what isn’t worth ? You can easily get lost when you take anything and everything into consideration while you want to manage, consider risks and protect your information. You should concentrate on the…
Where to find Information Security references ?
I tell you many things on this blog. Where do I find them and where does my competence come from? It’s an excellent question to which I’m answering today. I use this opportunity to review some of the published documents…
Losing my reputation, so what?
« Either show off as you are or be as you shwo off. » Djalal al-Din Rumi, persian poet persan, XIIIst century. What is Reputation ? Reputation, image, how we show off to others by how we are or behave – more generally…
Email security
A recent post by Clusir Tahiti (Information Security Club Region Tahiti) invites me to write on the same issue. I’ve already written on ‘sensitive’ information we too easily send via email without paying too much attention. I have to come…
How to keep cyberpirates away
It’s not an issue to discuss if or when a cyberpirate will – partially hopefully – take control of your computer. The main issue is : ‘how long is he already in’ and ‘what damage has he already done ?’ Are you…