2026-05-08

Dumb iPad

Image: Adobe Firefly

This time from the three-letter security alphabet, I’m picking the A — for availability — because the colleagues I complained to in a meeting about my iPad thought I really ought to write something about it. So here goes.

What happened? Well, my iPad had decided to cut off all contact with the outside world. Neither via Wi-Fi, nor via the SIM card. Apps that needed internet access grumbled that they couldn’t connect, or simply did nothing, without so much as a word of explanation. Not a single app gave even the faintest hint about what was holding it back. The obvious fix — turning it off and on again — didn’t help either, and the battery was nicely charged.

Time to call in reinforcements. The helpdesk had a magic button combination up its sleeve: “Press the volume-up button, then the volume-down button in quick succession. Now hold the power button until the Apple logo appears.” Now, on this iPad (10th generation), the top button is not a power-off button, which immediately had me sceptical. But fair enough, worth a try. Which one is volume-up again? Ah yes, this one. Press, press, press, wait… No Apple logo.

After that, the helpdesk fired a whole series of questions at me. For instance, whether other devices were connecting just fine — a logical question, which I could confirm. So it had to be the device itself. Buried near the bottom was a question that made me go red in the face pre-emptively: whether flight mode might accidentally be switched on. It’d be just your luck, wouldn’t it — a stray finger tap silences your device and then you go complaining it won’t talk to anyone. Fortunately, I could quickly stand down: flight mode was off.

Patiently, my friendly colleague suggested the next option: resetting the network settings. That puts just that specific part back to factory defaults. No joy there either. So the helpdesk pulled out the nuclear option: a full factory reset. Well, it had been coming, but as a user that’s obviously the last thing you want. It means setting up your device from scratch, and that takes time.

I left it alone for the rest of the day, but in the evening I tried my luck with AI. The clever chatbot came up with suggestions similar to those from the helpdesk. Notably, the very first option — the button sequence — revealed that I shouldn’t be pressing volume-up then volume-down, but the other way around: first “the volume button closest to the top button”. Which is, in fact, volume-down. After going through the full ceremony, the Apple logo did appear this time, but the problem wasn’t solved.

A few suggestions later, my AI companion asked whether I might be using a VPN. As it happens, last year, when I attended a conference in the US, I had indeed activated my personal VPN on the iPad to use the hotel and conference Wi-Fi without a care in the world. I’d completely forgotten, but I checked anyway (wise lesson: never assume you know the answer — just follow the instructions of whoever’s trying to help you).

After turning off the VPN app, a miracle occurred: the iPad sprang back to life. That thing had simply gagged my iPad. AI’s response: “It happens more often than you’d think: an update to the VPN app or an expired certificate causes the app to block all traffic (the so-called Kill Switch), even if you haven’t consciously activated the VPN.” What I find most troubling about the whole affair is that the VPN didn’t bother to mention that it had shut everything down. Same as that time they’d kicked me out for an alleged violation of the terms of service. I only discovered weeks later, by accident, that I had no VPN. Anyway, my subscription is up for renewal soon, and it’s too expensive and too American anyway. I’m switching to something friendlier.

An app that was supposed to protect my device had compromised its availability. Not great. And oh yes, the other two letters? Those are, of course, the I for integrity and the C for confidentiality. There — we’ve run through the entire security alphabet again.

Next week, due to the shortened working week, there will be no Security (b)log.

 

And in the big bad world…

 

 

2026-04-24

Stone martens

Image: Pixabay

Not only nice people live in our neighborhood. There is also a stone marten. And do you know what that little creature is particularly fond of? The wiring and hoses in cars. Years ago, the windshield-washer fluid line in our car was chewed through. Recently, the neighbor’s car suffered gnawed cables as well. Once that was repaired, the marten struck again. The same car.

Children and teenagers do not like walking through our street. That is because almost every house has a device that emits a high-pitched beep as soon as it detects movement. It also fires off flashes of light. Apparently, stone martens do not like that. And young people, who have a wider acoustic frequency range, are not fond of it either (with some devices I can actually hear it myself).

There are more defensive strategies. Under our hood there’s a toilet freshener block. The neighbors use a bundle of dog hair. Someone else has placed a piece of wire mesh under the car. And finally, someone even had a kind of electric deterrent installed in the engine compartment. I asked Copilot what it thought of all this. According to it, the mesh and the (harmless) high voltage are reasonably effective, but with other solutions you also need a fair bit of luck. Forget about the scent products. Although: proven in practice, I am inclined to say. Whereupon I must immediately admit that I cannot prove a causal connection between the toilet block and the absence of bite damage.

The stone marten is a predator with a strong territorial drive. It marks its habitat with scent traces. When it encounters the scent of a competitor, it tries to remove it. For example by chewing it away. In addition, those wires have a pleasant smell and likewise a pleasant bite. It is also nice and warm there after a car has been driven, and well sheltered.

No measures had been taken for the car that was attacked twice. That implies that the measures taken by the others do work. Just as burglars are likely to choose the least secured house in a street, the stone marten also opts for a snack that does not require it to pinch its ears or nose. Or where it does not receive electric shocks. That neighbor at least has the luck of driving a leased car. Perhaps that made him more careless than the rest. But still, it causes him quite some hassle.

Yesterday I visited the datacenter of a company where a lot of money is involved. That was evident from the physical security measures. From the outside it looked a bit like a prison. Once inside, my identity was checked and my fingerprint was stored on a badge. The badge hung from a bright red lanyard stating that I was only allowed to walk around when accompanied, and the badge showed the name of my host. With the badge I could pass through a single-person airlock deeper into the building: the outer door opens, you step in, the door closes, you present your badge and your finger and if everything checks out, the inner door opens. But first you still had to pass through a detection gate (which of course triggered on my belt) and my belongings went through a scanner.

The nature of my visit meant that we also went up onto the roof. At the door to the roof, my host first had to inform security, because obviously that door was secured. Not only with a badge reader, but also with a door-open status detectorhence that phone call. Once on the roof, I saw how a swiveling camera was keeping a close eye on us. Once back inside, my host had to sign us out.

There was an impressive number of screens in the security control room, connected to an even more impressive number of cameras. Of course the guards cannot possibly watch them all constantly, but the systems alert them with a beep when they detect something out of the ordinary. From the sound of the beep, the guards know where to look.

Our neighbor has granted me access to the security camera footage at the front of his house. Two see more than one, he must have thought. Moreover, his camera captures our front garden rather generously. It also immediately provided an innocent opening to ask what the camera at the back of his house sees. Our backyard is neatly out of view. As it should be, because there we value privacy more than security provided by a third party.

And so everyoneat least everyone who gives it a thoughtadjusts their security to their own needs. I just hope we do not end up in an arms race with that marten.

There will be no Security (b)log next week.

 

And in the big bad world…

 

 

2026-04-17

Leonardo & Cookie Monster

Photo: author

A long time ago, somewhere in the 1980s, I was on holiday in Italy with my parents. We visited many places, including Padua. There, we wanted to see an ancient university building, but it was just closing. The friendly caretaker gestured that we were welcome to accompany him on his locking-up round. And so it happened that, moments later, we found ourselves standing at the lectern of Leonardo da Vinci.

Have you ever been somewhere where it felt like you weren’t really supposed to be there, yet the moment felt magical? That’s how it felt back then, and I felt it again this week, when I went to get a cup of hot water for tea at the office. The machine showed a red bar. Not a good sign. The screen no longer displayed the usual options for every imaginable type of coffee, but choices such as ‘remote-controlled measures’ and ‘ingredient management’. And in the top left corner was the most important label of all: ‘machine administrator’. With, right next to it, a ‘log out’ icon. So yes, we were logged in as administrator.

Let me speculate for a moment about what might have happened here. The machine had a malfunction, as evidenced by the red light (on the adjacent machine, that bar glowed white). A maintenance engineer had been called in, but couldn’t immediately fix the problem. For a moment it looked as if various things simply needed refilling, but there was more going on; the bottom message on the display read ‘middle grinder empty’, yet that container was absolutely brimming with coffee beans. So the engineer must have left to fetch spare parts, and forgot to log out.

Colleagues from my meeting stood there, grinning. Stumbling into something like this while a security officer happened to be visiting – well, that was rather perfect. I see this more often: people smile sheepishly, feeling a kind of second-hand embarrassment. Someone hasn’t followed the rules and a security officer has caught them red-handed. Oops. Here comes trouble!

Coffee machines fall well outside my official jurisdiction, but I can of course use this example to highlight the broader issue. And that issue isn’t so much that people occasionally forget to lock their workstation – you get that, don’t you – but rather the more general picture that security isn’t always top of mind. When it really should be.

Recently, I was in a discussion about AI. It was about how you’re not allowed to include personal data in your prompts; for example, you can’t just paste in an entire letter and ask the system to analyse it. A manager said that one of his employees had approached him with a brilliant idea: ‘I’ll just ask AI to remove the personal data first!’ The employee was sent away with the instruction to think very carefully about what he had just said. Hopefully by now he has realised that you shouldn’t ask Cookie Monster to keep the cookies safe before washing the cookie jar.

Look, I understand that you don’t share my professional deformation of seeing risks everywhere. But surely a certain level of basic hygiene is not too much to expect, right? You don’t have to be a Leonardo, but don’t be a Cookie Monster either.

 

And in de big bad world…

 

2026-04-10

Ethical hacking

Image from Unsplash

After years, it was time for me to go back to training. I looked for one where the chance would be small that I’d learn very little; something that tends to happen quickly when you’ve been around the block in this field. A course on ethical hacking more than met that requirement.

For more than three decades, I’ve viewed the world from the right side of the line. My work revolves around security policies, risk analyses, and compliance, to name just a few things. I read and hear about what goes on on the wrong side of the line and try to make life as difficult as possible for the folks who hang out there. With this hacking course, I wanted to see the world from their side for once. Because, as Sun Tzu already knew in the fifth century BC: ‘Know your enemy and know yourself, and you will not have to fear the outcome of a hundred battles.’

But what is ethical hacking, exactly? Broadly speaking, there are two kinds of hackers: the good and the bad. The latter usually make the news, for instance through data breaches at the police or at telco Odido, both here in the Netherlands. That’s how hacking is known to the general public: unlawfully breaking into computer systems. The people who do this come in many shapes and sizes. At the bottom of the ladder you find the script kiddies: people who use ready‑made recipes to do things without really understanding how they work. And right at the top you have organized crime and state actors.

But there are also benevolent hackers. Like their malicious counterparts, they look for weaknesses in defenses. The big difference is that they don’t exploit those weaknesses for personal gain; they responsibly report them to the organization where they found the vulnerability. You can hire ethical hackers to test your systems, but some also operate on their own initiative. Quite often, if they play by certain rules, they even receive a reward. That can range from a T‑shirt to (a lot of) money.

Of course, after a five‑day course I am far from a seasoned hacker. Quite the contrary: last week my head was spinning from hacking tools with countless options, the many ports that can be attacked, and lots of other things that any self‑respecting hacker is expected to know by heart. Back in the MS‑DOS era, you also had to do everything from the command line (the C:\ prompt), but by today’s standards that feels rather archaic. And yet that’s still how things work in that world, only now with Linux instead of MS‑DOS.

The most important thing I learned is that hacking involves quite a lot, but that once you’ve mastered the tricks, it can be remarkably easyat least if your opponent doesn’t defend themselves well. In the simple scenario we practiced, you find the IP address of your target, check which ports are open, investigate whether known vulnerabilities exist for the services running there, and boom, you’re in. Obviously, it’s (hopefully!) not always that easy, but the principle is likely the same: the hacker looks for weak spots in the defense. And you’d much rather have those vulnerabilities discovered by an ethical hacker than by a criminal. That only helps, of course, if you then actually act on the findings. Fortunately, everyone understands that. Right?

I’ve always had admiration for colleagues who do this for a living. Now that I better understand what they do, that respect has received a serious upgrade. It’s important, rewarding puzzle work that requires a great deal of knowledge and skill. They make discoveries that sometimes cause quite a stir. And then you see them walking around beaming. A fine sight.

Finally, I’d like to share something entirely different that I learned and that anyone who uses AI chatbots such as Copilot, ChatGPT, and Claude can enjoy. It’s about ELI5. That stands for ‘explain like I’m five’ and ensures that answers are phrased in simple terms and don’t assume prior knowledge. Not baby talk, but often using nice analogies. Just try something like: ‘ELI5: Explain what an IP address is.’

 

And in the big bad world…

 

 

2026-04-07

AI calling your parents

Image from Unsplash

Have you ever had no time (or no desire) to call your parents? Then there’s now a handy service that everyone will benefit from!

This is about a company offering a rather unusual AI service. They actually call your elderly parents. So you don’t have to. On their website you’ll find a photo of the Czech founder with his mother, accompanied by the story of how he lived abroad but wanted to stay in touch with her. Different time zones, a demanding job, and “the unpredictability of life” kept getting in the way. And so the idea for his company was born. It helps people feel “remembered, connected, and valued,” they say.

A bit more information from their website. “Mary” calls the elderly person and asks how they’re doing. She also remembers what you tell her. Incredibly handy, of course: if you tell her today that you need to see the doctor, she’ll ask you tomorrow how it went. She also makes use of 1,400 “life story questions”something like a database full of opening lines. On top of that, she sprinkles interesting little facts throughout the conversation to help keep the mind sharp.

Before long, the older person will likely no longer realise they’re talking to AI. Simply because AI sounds so natural. I’d bet that you and I wouldn’t hear the difference either. And once you start considering Mary a friend, you’ll probably tell her the same things you’d tell a real friend. For example, about your healthsomething older people talk about quite often. The company proudly displays the logo “HIPAA compliant” on its website. HIPAA is U.S. legislation concerning the privacy and security of medical data. But it’s less strict than our GDPR. In the EU, medical data is considered special-category personal data, which is subject to extra stringent rules.

Older people are particularly vulnerable when it comes to cybercrime. Recently there are a lot of stories about fake police officers showing up to collect money and jewellery, supposedly because some great danger is looming. Criminals could easily piggyback on a service like this. For example, by pretending to be Mary and asking clever questions to manipulate their victim. Because they trust Mary, there’s a greater chance they’ll go along with the story. You can basically wait for this to happen, sad as that may be.

In your work, you may sooner or later get a phone call from a fake Mary as well. These scams already happen. Three years ago, an American named Brianna was supposedly kidnapped. Her mother received a call and heard her daughter speaking. Or so she thought. Because with AI, a few seconds of audiostolen from social mediais enough to make someone sound lifelike while saying anything you want. The same could happen with your manager, for example, asking you to email certain data. So if you get a strange request over the phone, call the person back on the number you know to verify that it’s legitimate.

And as for Mary? I prefer to call my mother, who turned 93 today (happy birthday!), myself. Much nicer that way.

 

And in the big bad world…

… a training course got in the way of filling this section.

 

 

2026-03-20

Rusting chains


‘The weakest link in IT security is always the one between the screen and the backrest of the office chair,’ someone joked in the comments under my previous blog. That blog was about WhatsApp and Signal accounts that had been hacked through their owners. Directly opposed to that is a statement by a former general director of our organization: ‘People are the strongest link in security.’ How do these statements relate to each other?

You often hear that first quote. It basically means: the computer user falls for it with eyes wide open because they don’t understand it all. Some even dare to speak of ‘that dumb end user.’ That, at any rate, is unfair: you simply cannot expect every employee to thoroughly understand all the ins and outs of cybercrime and information security or to be constantly alert to suspicious situations. So stupidity is almost never the issue (I will come back to that ‘almost’).

A chain consists of multiple links. According to the old saying, the weakest link determines the strength of the chain as a whole. That saying implies that one link can be designated as the weakest. But what if another link rusts faster and overtakes its already weak neighbor? Then suddenly a different link becomes the weakest. If the chain is then put under tension, it may break in a completely different place than expected. In short: I don’t believe much in the weakest-link theory. What I do believe in is a chain that is regularly maintained. If a weak spot is found, it should be repaired.

The security chain has two kinds of links: technical and human. I am keeping it simpler here than other models because this is all I need to make my point. Ideally, the technology would be able to keep all harm and inconvenience outside. Our mail filters would recognize all phishing attempts and send spam flawlessly to the trash. All DDoS attacks would be repelled before they reached your network. And hackers wouldn’t stand a chance because all break‑in attempts would be crushed instantly.

We all know that this isn’t how things work. A hundred percent protection through technology alone is an illusion. You wouldn’t think so if you walked through a security expo where vendors promote their hardware and software. They always seemed to sell perfect security, and with the rise of AI that has only become ‘worse.’ But reality is different: the links in the chain have some rusty spots. And do you know why that is? Because the links rub against each other. It’s not like one system protects everything; there is interaction. And things can go wrong there. In the interaction between technical systems, but also — more often? — in the interaction between technical and human links. Put simply: if a system gives an alert but the user dismisses it as irrelevant while something is really happening, then you have a serious rust spot.

So, are humans the strongest link? When I first heard that claim, I was surprised, because the weakest‑link theory was widely accepted then. But I have changed my mind since. Nowadays, I tell my audiences that they are indeed the strongest link. The user is my last line of defense — when all technical systems have failed, the human is the only remaining safeguard. At least, for the kinds of trouble in which the user plays a role.

Stupidity is almost never the issue, I wrote. Almost. So does that mean sometimes it is? Yes. It happens that people have a bad feeling — for example, they don’t trust a certain email. And then they still click the link or open the attachment. Just to see what happens. Because they’re curious. Or because they think: well, this isn’t for real, right? That’s not smart. Just follow the simple rule: when in doubt, assume it’s malicious.

And in the big bad world…

 

 

2026-03-13

WhatsApp and Signal hacked? No!

 

Image from Unsplash

Last Monday, Dutch broadcaster NOS ran the headline: ‘Russia hacks WhatsApp and Signal of government employees, intelligence services say.’ Let me explain why I label this as ‘devaluation.’

First, a reassurance: neither WhatsApp nor Signal has been hacked. At least, not if you use the common meaning of hacking: gaining unauthorized access to a computer system (not a formal definition, but the way I see it). In this case, the computer system would be the service as provided by WhatsApp and Signal. Your individual account is not the target.

Let’s pretend for a moment that these chat services really were hacked. That would mean a hacker had broken into their servers and done all sorts of things that many people would not appreciate; allor at least manycustomers would have been affected because their data had been compromised.

But that’s not what happened here at all. The actor (a polite term for perpetrator) targeted individual accounts of specific types of officials. These people received a message that appeared to come from Signal’s chatbot; it looked like an official warning from the service provider about suspicious activity. It also claimed that data might have leaked and that attempts had been detected to access private information. You could prevent this, the message said, by completing the verification process.

So what is actually happening? The actor wants to log in to your Signal account. The app then asks for a code, which is sent by SMS to the phone number Signal knows: yours. The actor needs that code, and your self‑chosen PIN, to log in. Hence the message they send you. The idea is to make you panic so that you quickly complete the ‘verification process’, which really is a trap. If you fall for it, the actor can take over your entire account and even change the linked phone number to their own. They now have access to your contacts and can read new chat messages (both one‑to‑one and in groups). They can even send messages as you. You lose access to your account, but you can create a new one and get your chat history backbecause it is stored on your device. Great, no problem, nice that they helped me so well, you might think.

In another variant, they have you scan a QR code or click a link. They make you believe you are being added to a WhatsApp or Signal group chat, but in reality the attacker’s device becomes linked to your account. The actor can now see all your chats, often including chat history. You notice nothing. In this attack as well, they can read new messages and send messages on your behalf.

Now, back to the term hacking and why I think it is being devalued. From the 1960s onward, a hack was a clever technical trick in the (American) computer and model railway club world, and a hacker was an exceptionally smart programmer. In the 1980s, the term was used for people who conducted in‑depth research into computer systems and networks. If they bypassed security, it was out of curiosity and in order to test things. There were also crackers, their malicious counterparts. From the 1990s onward, the distinction faded and hackers came to be seen as criminals in general. See my personal definition above.

The NOS headline suggests that WhatsApp and Signal have been hacked, while the cyber advisory from Dutch intelligence services explicitly emphasizes that this is not the case. Apparently, NOS was reprimanded, or the editorial team corrected the intern, because later that day the headline changed to: ‘Intelligence services: Russian hackers access WhatsApp and Signal accounts of civil servants.’ And the article gained a paragraph titled: ‘No breach in the messaging service itself.’ In the original version, ‘hacking’ seemed to refer to pretty much all computer‑related trouble coming from the outside. As described above, the term was already significantly devalued, but this was simply misleading.

What actually happened here is called social engineering. In this technique, it is not the computer but the human behind the computer that is attacked. If they succeed in getting you to share a code or scan a QR code, their mission is accomplished. Social engineering is also known as hacking the humanwhich, ironically, is accurate.

 

And in the big bad world…

 

Dumb iPad

Image: Adobe Firefly This time from the three-letter security alphabet, I’m picking the A — for availability — because the colleagues I comp...