Weekly Security Roundup #12: Past Lessons and 2015 Resolutions
Fight against online threats and cyber-crime continues.
At the beginning of 2015, we try to slowly leave behind the Sony Pictures hack, though we are still forced to notice the state interference in the digital world, and prepare for whatever awaits us in the new year.
Our own security blog provided 5 security predictions for 2015, from our CEO, Morten Kjærsgaard.
Our goal is to bring you the latest security news from the digital world. And this is what we do.
These are the 10 security articles of the week that you should read in order to improve your online security.
Security articles of the week
How do we keep online hackers away from our computers? Though it may be difficult to follow all the necessary guidelines, there are a few big security mistakes we can avoid. Read and learn about them.
This is what a massive data breach and a giant scandal between rival states can do: a relatively normal comedy movie turned into a must see film for the Christmas. In the end, we need to ask: What was all about after all?
How difficult is to post online your thoughts in China? And how efficiently are the main online tools for spreading ideas and opinions blocked?
Since social media platforms are difficult to control, it is not that difficult to stay online in China these days.
Just when we were saying that China censorship is not that bad, we find out they stopped Google mail service and there’s nothing we can do about it. Any way, it is a subject we need to follow.
Cyber-attacks visual representations have been put together in a few amazing interactive maps. Though they cannot present all the online attacks that take place, they still give us a good idea on the main actors in this game.
We install many apps on our Android devices and we give them permissions to our mobile systems. But how are they using this data and what are those apps that collect most information from our devices?
An interesting article on what it actually means to have a complete security policy for your company. To quote the article’s author, you need to remove the laptops and mobile devices from your company and impose internal network access with two-factor authentication. But who can impose such a strong policy and how far can we go to restrict individual privacy?
We already know about state interference and control on social media networks and private companies, like Facebook or Twitter. But why does it happen if not because of their importance in promoting freedom of speech and political or social matters? How should these private American companies act on foreign soil and face internal regulations imposed by states, such as China or Russia?
2015 is here. But are we prepared for it? Did we actually learn our lessons from the past years? Here are 8 resolutions we can follow to have a happy new year.
The FBI is looking for cyber-security experts and they even post the jobs online. Are you up for the job? Can you help the good guys track down people involved in online criminal actions and bring them to justice?
We are sure there are other important security news out there. So please let us know, what security news did we miss and should have been included here?
This post was originally published by Aurelian Neagu in January 2015.