The risks you take by using anonymization networks

Disclaimer: This blog post contains a mix of fact, personal values, guesses and also contains a certain amount of conspiracy theories. You’re welcome! By now you know all about the anonymization networks, such as Tor, VPN services and such. And there are also these ever-increasing voices saying that you, as Internet user should use them…. Continue Reading

Just about to finalize my CISSP certification

Last week I managed to pass the CISSP exam. IT was a pretty hard one; the questions themselves were good ones and thus difficult. Nevertheless – I passed! A couple of advises if you’re about to take the test: Be prepared, but not too prepared. That is, studying is of course crucial, but perhaps not… Continue Reading

WPA3 is here – Hurray!

Finally WPA3 is here! Or at least, the Wi-Fi Alliance today announced that they begun certifying products with the WPA3 protocol. Why Hurray? It’s now quite a few years since WPA2 was released and products getting certified. 14 years, to be more precise. During these years WPA2 has been subject to a number of vulnerabilities… Continue Reading

Who’s behind the access request?

  Today is the day – the infamous 25th of May 2018. When we woke up this morning GDPR was finally in effect… I was expecting this morning to be something really extra. I was expecting something like that the sky would be green and the sun would have been blue. But it turned out… Continue Reading

Word of the day: Panic!

Tomorrow is the 25th of Maj 2018 Ever heard of this new law – GDPR? If you haven’t, well – good for you then. That means that you’re not in any way involved in processing personal data. Not in your line of work, or in sports clubs or so. It would also mean that you’re… Continue Reading

Will the CLOUD Act slow down digitalizatiton?

Quite recently the CLOUD Act was approved and signed in the United States. It’s a from my perspective somewhat expected and through it all welcome missing piece in cyber crime fighting. What is CLOUD Act and what does it mean? CLOUD Act, or Clarifying Lawful Overseas Use of Data Act was enacted as late as… Continue Reading

GDPR Prepareness + Phishing = True

Phisher

Lots and lots of organizations are preparing themselves in order to be GDPR compliant. In the eleventh hour in some cases since GDPR will go into effect on the 25’th later this month. Three weeks. 21 days. What many of them have to do is to get your consent in order to keep process your… Continue Reading

Disaster Recovery – not as easy as it might seem

Disaster recovery – quite straight forward, isn’t it? Well – it might be. At least when it comes to IT environments that aren’t too complicated. The downside there is that there aren’t very many IT environments that aren’t complicated. Most of them tends to be, one way or another. Many disaster recovery solutions, no matter… Continue Reading

Worried about using Facebook Messenger? Try Signal!

I guess you’ve heard it all over and over again about the Facebook privacy scandal. There’s been a lot of focus on the scandal itself and Mark Zuckerberg testifying before the Senate. I have wrote a few posts about it as well. Read more: Why answering/setting up quiz’s and other stuff on Facebook is a… Continue Reading

Office 365 heavy target for phishers

Last Thursday I meet with one of Microsofts Trusted Security Advisor’s and we got into a discussion about phishing. I mentioned that I have seen quite a lot of phishing attempts on customers in Sweden, using the Office 365 community. Microsoft is well aware of this extensive targeting. It’s not something new, not for me,… Continue Reading