Friday, March 6, 2015

How Not To Write A Password Policy

from here (source image)

Thanks to @RooneyMcNibNug for tweeting a screenshot of what can only be described as a ridiculously long and detailed password policy. The more rules there are, the fewer possible passwords that will qualify as acceptable, and so the easier it will be to run through them all.

Peeking Where The Sun Don't Shine

found on memebase

I can only imagine that seeing horrible, horrible things is an occupational hazard for professional peeping toms

Thursday, March 5, 2015

InfoSec Must Love Diaper Duty

from here (source image)

It's weird how we live in the information age, but the dominant information security paradigm seems to be to actually withhold information from users under the school of thought that they either can't use information about how threats work and how to protect themselves or that they shouldn't need to think about such things. Almost as if the people with knowledge were trying to keep their knowledge scarce so that it can remain more valuable in the knowledge economy.

Vote Bobby Tables Bumper Sticker

This isn't one of my designs, although I have made Bobby Tables related merchandise before. This is one I found while googling (I forget what I was looking for now) and I thought it was good enough to share (and now I'm finally getting around to doing so).

Wednesday, March 4, 2015

Where Do You Think You're Putting That Hand?

from here (source image)

If the machines rise up and kill us all, like InfoSec Taylor Swift warns us, things like this might be the reason why.  At least Athena the robot got frisked by female TSA agents instead of male ones.

Peeping Tom Cat Knows Too Much

found on the chive

Ever feel like you're being watched? Maybe you really are.

Tuesday, March 3, 2015

Jeepers Creepers Where'd You Get Those Peepers
from here

Any authentication system can be bypassed, and making it harder isn't always better. I don't know about eyes specifically, but there have been cases of other body parts being stolen in order to bypass a biometric security control.