Contents
GDPR – data processing and data subject requests
GDPR is probably one of the best legislative changes the world had experienced in terms of information security and privacy.
A lot of companies are still far away from properly protecting their users data and can see this in data breaches and big hacks around the world.
In business, proper security and privacy practices usually means an added cost to the license to operate. It is usually something they do not truly believe in, even though it can mean big costs or even going out of business.
As part of my independent Security and Privacy research, I frequently stumble upon companies like those mentioned above. As a response, I create a report detailing what risks are they exposing themselves and their users too. If they fail to take it into consideration, I will file a complaint to the Data Protection Authority.
These cases are listed below :
Some cases and complaints can lead up to unexpected conclusions, like
- How to Reduce the Data Protection Authority Complaint Resolve Time by 20% – an analysis of the Danish Data Protection Authority way of handling complaints
Personal Finance in a Digital World
It’s more easier than ever to do any kind of financial operation. Transferring money to others can be done in a second, international transfers can now be done in a matter of minutes rather than days, paying your bills or investing can be done with a single click.
At the same it, It’s also more easier than ever to spend your money or to even get robbed of your money without even realizing.
The following articles detail information security risks around financials. These include tips, my own setup and my way of thinking when it comes to mitigating these risks.
Personal finances
- Handling your money safe and fast with Revolut – where I detail my use cases for financial operations, the risks associated with those and what tools do I use to make things safer and smoother
- Delayed or canceled flights and how they can impact your money and time. The complaint process as well as the time to get your money can be very long. I’ve had a bad experience with KLM for which I created the most comprehensive complaint (that I know of) . You can use that as example for your next complaint or you might just be interested in the take-aways from going through an airline complaint
Investments
- “Cyber Security Risks in P2P Lending: What Investors Should Look Out For” is a guest post on P2PMarketData about online risks that investors usually neglect. On the same topic, I have an infographic about the same Security risks and how can they be mitigated.
- Performing your Due Diligence on P2P Investment platforms
- I asked 15 P2P Lending Platforms About their Security Practices and their Answers were Unsatisfactory – the more comprehensive version
- I asked 4 P2P Lending Platforms About their Security Practices and their Answers could have been Better – the basic version
If you are a high net-worth individual that has his/her wealth spread across various online/offline methods, you and your wealth will benefit to be better informed about online risks. It goes the same, even if you are an average net-worth individual – the only difference is that you have less to lose, but that is still a lot for you. Reach out now for a free security assessments for investors of any net-worth size.
Information Security and Privacy for all
Information Security and Privacy is a not-very-well-understood topic that annoys people. It hard to understand, it’s technical and above all, it makes our life slower because of restrictions, policies, passwords, one time codes and whoever knows what else comes next.
The following articles aim to make Information Security and Privacy more accessible to anybody. You don’t need to be a tech wiz to understand these concepts or even to apply them.
- Side benefits of using a Password Manager – besides the fact that a password manager can help you be more secure by storing your passwords in an encrypted fashion, it can also have many other benefits
- Must have plugins for Thunderbird – for both security and productivity reasons. These plugins can enable you to be more efficient and give you a better idea of whether the email you have received is legitimate or not
- Windows 7 User Endpoint Security – basic, easy and free – setting up your Windows laptop to be secure-enough for the average needs, using free methods.
- What do I do after installing Windows 7 – quick ways to disable unnecesarry services that may be a security issue for your Windows 7 machine
- Send an encrypted email using Thunderbird in Ubuntu
- The all-required backup process – brief on some tools that I use for backup on Windows machines
- Getting informed on time is crucial when it comes to security – read about how I stay up to date with security relevant media
- How to choose your passwords
- Getting rid of spam
- Firefox addons (2012)
Information Security and Privacy for techies
Information Security and Privacy down to technical specifics. Includes research and analysis, projects and more.
- Email Malware analysis from August 2017
- Email Malware analysis – sloppy Cerber dropper
- Email Malware analysis – UPS deliveries
- Email Malware analysis – undelivered parcels
- Email Malware analysis – you have received a new fax
- Email scams – getting money from Industrial and Commercial Bank of China
- WordPress Login Attempts – observations and conclusions from 2015
- Offline analysis in Security Onion
- Snort alerts – passing through the Onion
- How ELSA works
- Security Onion – from traffic to analyst
- Intercepting and modifying HTTP uploads
- Understanding the Snort architecture
- SmoothSec vs SecurityOnion
- Snort tunning
- Creating your first Snort rule
- Basic understanding of Snort rules
- Understanding network security monitoring (NSM)
- How to install Snorby for Snort
- Snort installation error
- How to install Snort and AcidBase GUI
- Hospital Wifi security review
- Protect against ARP-spoofing
- Sniff traffic from LAN using ARP
- 10 rules of information security
- Fake AP and real statistics with OpenWRT
- Wireless deauthentication
Hosting
My take-aways from running a hosting business and from hosting my own web projects.
- Getting the hang of fail2ban
- Setting up and debugging a PPTP server on Debian
- How my traffic dropped 10 times and I’m not worried
- E-mail server configuration – through trial and error
- Why are e-mails from legitimate server not received
- WordPress static content generator
- 7 things I look for at a VPS provider
- Free hosting control panels AKA alternatives to Cpanel
- The most complete .htaccess generator ever – v0.1
- The most complete htaccess generator ever
- Migrating media attachements from a WordPress.Com blog
- LAMPP or XAMPP – How to
General tech
These can be various issues that I’ve solved and documented, or just something interesting i did that I know i will need again in the future.
- Understanding the crontab
- Linux permissions prettified
- All in one PXE server
- Collaborative coding for beginners with Git and Eclipse
- Turning a PC into a gateway
- What is SSH tunneling
- VPN to Cisco AnyConnect
- SSH Tunneling in OpenWRT
- Changing the default route in Linux
- Starting out with Puppet
- DHCP packet received on eth0.2 which has no address
- Extending and improving my home network
- Ubuntu 12.04 desktop hang because of gnome-session
- Why and how to change your DNS server
- Categorizing IP addresses when monitoring
- Spreadsheet ### error
- Custom laptop battery notifications
- Mounting a TrueCrypt volume from the command-line
- Fix the BackgroundContainer.dll startup error
- Sony Reader PRS-T3
- Generating monthly reports for OpenBiblio
- Port 17500 TCP open on Windows PC
- What to do with PCAP files?
- How to add a new Debian repository
- How to install Eclipse with Git, Bash, PHP, Python support
- Checking and restoring your backup
- Weekly database backup (compressed and encrypted)
- Huawei EULA
- How to root Huawei Ascend Y210
- Seagate Backup Plus 1TB External HDD
- OpenBiblio blurred barcodes
- How to use OpenBiblio (screenshots)
- Setting up a school library with OpenBiblio
- Adblock not working
- Huawei Ascend Y210
- Swollen smartphone battery
- Fast way to setup a Windows PC
- MySQL Error Number 1005 Can’t create table ‘.mydb#sql-328_45.frm’ (errno: 150)
- Siemens Gigaset USB Adapter 300
- Rooting my Samsung Galaxy Y
- Samsung Galaxy Y S5360
- GPS Wardriving
- Alfa AWUS036NHR USB Wireless Adapter
- Holux GPSlim 236
- My bash scripts
- RS485 and Python
- OpenWRT on TP-Link TL-WR740N
Events
- Bornhack 2019
- P2P Conference 2019
- Odense Innovation Tournament 2014
- Open Source Days 2014
- LEGO IT Summer Camp
- Meet Sir Richard Branson and Morten Lund Skype Co-founder
- Impressions from Karrieredagene 2014
- Karrieredagene Denmark 2014
- Start your own business presentation by Ridha Shimi
- Empower to the people – the event
- Empower to the people, a FabLab event
- E-12 Odense
This blog exists since I was studying, thus some assignments, events from back then will be listed below
- Admin-in-a-Box – Provisioning and cloning for SMBs
- Raspberry Pi and 3G connectivity from TDC Denmark
- TheCrazyStudentBlog – another web project
- Scanamenities workshop
- FabLab Workshop
- My internship – thoughts and retrospective
- Special Subject 3 – Cantenna
- Networking-student photo session
- Health Games Lab Administrator
- A new iphone app – Never-Bored
- RomaniPrinLume.Com – a new web project
- Pimp the Elevator – an innovation exercise
- Information Security Incident Handling short course
- Professional Special Subject – w5 log
- Professional Special Subject – w4 log
- Professional Special Subject – w3 log
- Professional Special Subject – w2 log
- Professional Special Subject – w1 log
- Facilitating a creative process
- An interesting way of involving students in educational “upgrade”
- Visit to HCA Airport and Lindo Industrial Park
- Company crawl in Svendborg