General discussion
-
CreatorTopic
-
February 6, 2006 at 5:44 pm #2192411
Topic is locked -
CreatorTopic
All Comments
-
AuthorReplies
-
-
February 6, 2006 at 7:12 pm #3093439
Securing VoIP
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
?
Voice over IP, also known as VoIP, is quickly growing in popularity. Organizations are initially attracted to this relatively new technology because of its lower per call costs when compared to traditional voice services.? But they soon realize that VoIP provides additional value.Unified messaging, though still in its infancy, is introduced into the enterprise.? Users […]
-
February 6, 2006 at 7:12 pm #3093435
Deleted Data Files Aren?t?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
Deleted files on retired hard drives might be a law suit waiting to happen.? Deleting a file from a disk isn’t enough to wipe the actual information.??In Windows, deleting a file simply tells the operating system it can reallocate the space the file currently occupies.? The file no longer shows up in a folder listing, […]
-
February 6, 2006 at 7:12 pm #3093436
The Fundamentals of Keystroke Logging
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
This month, hackers in China attempted to place keystroke loggers onto UK Parliament systems via email messages. ?Phishing attacks in which keystroke loggers are installed on PCs are becoming more frequent. ?Keystroke loggers are also popular among hackers whose attack vector of choice is instant messaging. ?Because of the growth in the rate of keystroke […]
-
February 6, 2006 at 7:12 pm #3093437
Peer-to-Peer IP Telephony Security Challenges
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
Peer-to-peer?VoIP phone services provide an inexpensive alternative to traditional switched services.? So?many businesses are looking?at ways to implement this Internet-based functionality.? Before you?make a decision to toss out the old and bring in the new, it’s important to understand the risks associated with Internet phone service.?
Since Skype is the unquestioned leader in this?space, I’ll use?it […] -
February 6, 2006 at 7:12 pm #3093438
An Intrusion Defense Solution
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
Rather than write another piece on security in general for today’s post, I’m going to share my team’s experience in selecting an intrusion defense solution that expands on our existing firewall perimeter defense.? During the past several weeks, my team and I?struggled with the new infrastructure and management design to support our enterprise security strategy.? […]
-
February 6, 2006 at 7:12 pm #3093430
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 6, 2006 at 7:12 pm #3093431
Managing Unapproved Applications
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
In today’s workplace, users aren’t satisfied with the applications provided by the internal IS staff.? In an effort to maximize their productivity and to improve their work environment (at?least those are the reasons given), many users install applications brought in from home, downloaded from the Internet, or provided by a friend.? So if it makes […]
-
February 6, 2006 at 7:12 pm #3093432
Desktop Security Service – Windows OneCare
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
In the spring of 2005, OneCare was released with much fanfare.? It’s Microsoft’s venture into the world of desktop security.? But it comes with a twist.? Microsoft’s solution is a software-as-a-service offering.? This means that you will probably pay a monthly fee for the rights to run the combined anti-virus, backup, cleanup, and update services.? […]
-
February 6, 2006 at 7:12 pm #3093433
Dissecting Nyxem: New dog, same old tricks.
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
There has been some real buzz concerning a new virus in the wild, Nyxem. While it employs the same old tricks virus coders have been using for years, it has a new nasty ending. Let’s discuss Nyxem (aka Mywife, Blueworm, BlackMal) and see what kind of risk we are really looking at.
How does this work?
The […] -
February 6, 2006 at 7:12 pm #3093434
Data Storage Security
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
Data in transit, across and between company networks, is usually the focus of extensive security efforts.? However, organizations typically regard data residing on internal storage devices as “secure enough.”? Databases and flat files stored on server, laptop, or SAN-attached disks don’t always move outside the security perimeter; so why worry?
In this paper, we’ll explore data […] -
February 6, 2006 at 11:04 pm #3093379
Deleted Data Files Aren?t?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
Deleted files on retired hard drives might be a law suit waiting to happen.? Deleting a file from a disk isn’t enough to wipe the actual information.??In Windows, deleting a file simply tells the operating system it can reallocate the space the file currently occupies.? The file no longer shows up in a folder listing, […]
-
February 6, 2006 at 11:04 pm #3093376
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 7, 2006 at 3:08 am #3093326
Deleted Data Files Aren?t?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
Deleted files on retired hard drives might be a law suit waiting to happen.? Deleting a file from a disk isn’t enough to wipe the actual information.??In Windows, deleting a file simply tells the operating system it can reallocate the space the file currently occupies.? The file no longer shows up in a folder listing, […]
-
February 7, 2006 at 3:08 am #3093327
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 7, 2006 at 7:13 am #3093155
Deleted Data Files Aren?t?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
Deleted files on retired hard drives might be a law suit waiting to happen.? Deleting a file from a disk isn’t enough to wipe the actual information.??In Windows, deleting a file simply tells the operating system it can reallocate the space the file currently occupies.? The file no longer shows up in a folder listing, […]
-
February 7, 2006 at 7:13 am #3093156
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 7, 2006 at 7:13 am #3093154
Security Risk Management
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
Risk management is an important part of securing today’s information assets.? Security has moved from the fringes of technology to take its place alongside other critical business activities.? And like other business activities, the resources expended on?the people, processes, and technology necessary to protect an organization’s information infrastructure must be justified in terms of return […]
-
February 7, 2006 at 11:07 am #3093013
Deleted Data Files Aren?t?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
Deleted files on retired hard drives might be a law suit waiting to happen.? Deleting a file from a disk isn’t enough to wipe the actual information.??In Windows, deleting a file simply tells the operating system it can reallocate the space the file currently occupies.? The file no longer shows up in a folder listing, […]
-
February 7, 2006 at 11:07 am #3093014
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 7, 2006 at 3:37 pm #3133156
Deleted Data Files Aren?t?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
Deleted files on retired hard drives might be a law suit waiting to happen.? Deleting a file from a disk isn’t enough to wipe the actual information.??In Windows, deleting a file simply tells the operating system it can reallocate the space the file currently occupies.? The file no longer shows up in a folder listing, […]
-
February 7, 2006 at 3:37 pm #3133155
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 7, 2006 at 11:12 pm #3133041
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 7, 2006 at 11:12 pm #3133042
Windows OneCare Live Cost Revealed
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
Late last week I wrote about the beta version of OneCare Live.? At that time, Microsoft hadn’t released?when it would role out the production release or how much it would cost.? Today, Microsoft announced that it would provide OneCare for $49.95 a year starting this June.? The annual price includes using the desktop security service […]
-
February 8, 2006 at 3:12 am #3133007
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 8, 2006 at 7:19 am #3132863
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 8, 2006 at 11:17 am #3092475
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 8, 2006 at 3:15 pm #3092375
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 8, 2006 at 7:14 pm #3092318
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 8, 2006 at 11:09 pm #3092294
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 9, 2006 at 3:12 am #3092232
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 9, 2006 at 7:48 am #3093692
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 9, 2006 at 7:48 am #3093691
Application Security: People, Process, and Technology
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
Most organizations have worked feverishly to secure the network infrastructure, including?executing rigorous operating system?patch and configuration management processes.? They’ve done such a good job, attackers are turning to applications as the next avenue of attack.? This includes both?commercial and?proprietary solutions.
In this article, we’ll look at the challenges facing managers as they implement commercial applications and […] -
February 9, 2006 at 11:24 am #3092104
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 9, 2006 at 3:21 pm #3091948
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 9, 2006 at 7:18 pm #3253913
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 9, 2006 at 11:12 pm #3253853
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 10, 2006 at 3:13 am #3253810
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 10, 2006 at 3:14 pm #3091005
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 10, 2006 at 3:14 pm #3091006
University of Washington Spyware Study Results
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
In a recent University of Washington?paper (see Sources below), the results of a five month study (May 2005?to October 2005)?of the state of spyware on the Internet were documented.? The following is a summary of the researchers’ conclusions:
In October 2005, the researchers crawled 20 million URLs.? Of that number, 19% contained executable programs.??5.5% of the […]
-
February 10, 2006 at 7:10 pm #3090947
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 10, 2006 at 11:11 pm #3090928
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 11, 2006 at 3:11 am #3090903
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 11, 2006 at 7:15 am #3077925
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 11, 2006 at 11:13 am #3077875
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 11, 2006 at 1:54 pm #3077846
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 11, 2006 at 3:22 pm #3077828
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 11, 2006 at 4:13 pm #3077811
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 11, 2006 at 8:12 pm #3077764
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 12, 2006 at 12:12 am #3077726
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 12, 2006 at 4:17 am #3077704
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 12, 2006 at 4:16 pm #3133819
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 12, 2006 at 4:16 pm #3133818
Invasion of the Botnet Armies
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
In previous articles, I wrote about? malicious hackers (crackers)?moving away from attacks for bragging rights to attacks for profit.? Part of this transition is the increased use of zombie PCs, or bots, to surreptitiously acquire personal and business information with criminal intent.? In this article, I describe the nature of bots and botnets, the danger […]
-
February 12, 2006 at 8:15 pm #3133763
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 13, 2006 at 12:10 am #3133730
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 13, 2006 at 4:15 am #3133690
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 13, 2006 at 12:24 pm #3091840
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 13, 2006 at 4:18 pm #3091710
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 14, 2006 at 12:13 am #3091586
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 14, 2006 at 4:15 am #3253334
BIOS Rootkit Attacks: What?s the Real Risk?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]
-
February 14, 2006 at 8:22 am #3253118
Goodmail Systems CertifiedEmail: What is it, and why all the fuss?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
Last month, AOL announced it was beginning?to use a certified email system designed by Goodmail Systems.? Basically, the Goodmail solution?attaches an encrypted?token to business/marketing email from certified businesses.? When AOL sees the token, and validates it, the email is treated as a non-spam message.? The catch for the sender is a small fee per message.? […]
-
February 17, 2006 at 11:40 am #3252245
eDiscovery Challenges
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
During the past two decades, the shift from paper to electronic filing of business documents introduced a new challenge: meeting the requirements of litigation discovery.? Not only are organizations keeping more information; the vast amounts of email messages and other types of documents are typically not organized in a way that facilitates quick, cost effective […]
-
February 20, 2006 at 10:49 am #3102064
Laptop Encryption: Reasonable and Appropriate?
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
Senior U.S. District Judge for the District of Minnesota, the Honorable Richard H. Kyle, ruled last week that companies don’t have to encrypt their data as a requirement of the Gramm-Leach-Bliley Act of 1999.? The GLBA places a set of constraints on how financial insitutions should handle customer information.? There’s been plenty of coverage on […]
-
February 21, 2006 at 6:56 am #3102767
Security Critical Success Factors
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
Within the context of information security, Critical Success Factors (CSFs) are objectives or goals that must be met before an organization can provide reasonable and appropriate protection of its information assets.? In this article, I explore seven CSFs that lead to an acceptable level of information asset assurance.
1.? Management support.? The support of all levels […] -
February 22, 2006 at 7:38 pm #3101613
Review: Surf Control ETS (Enterprise Threat Shield)
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
From a security and a general IT perspective there is a not so new and growing threat, unauthorized software. Call it what you like, spyware, adware, malware. The simple fact remains that if it is unsupported and was not installed by the IT staff, it could potentially wreak havoc on your environment. I’m going to […]
-
February 23, 2006 at 7:43 am #3100609
Unified Internet Identity Management
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
Microsoft?s new Windows project, code named Longhorn, is supposed to bring many improvements to the enterprise.? Not the least of which is better overall security.? But possibly the most interesting development is Microsoft?s recent announcement about changes to Active Directory.? These changes not only impact how user authentication and authorization are handled in your network.? […]
-
February 24, 2006 at 11:42 am #3272364
Sorting through the Security-in-the-cloud Debate
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
There?s a lot of talk these days about security-in-the-cloud.? Security-in-the-cloud is generally defined as protection provided by Internet Service Providers (ISP) that results in only ?clean? packets arriving at a subscriber?s perimeter.? Positions on the topic range from ?it?s a bad idea? to ?give everything over to a managed service provider.?? Based on my experience […]
-
February 27, 2006 at 2:20 pm #3272847
IP Surveillance
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
When managers discuss physical security, it?s usually restricted to what types of locks to place on what doors. ?This is a good start, but locks are only one component of effective physical security. ?In fact, a lock is intended as one of many safeguards to delay an intruder until he is identified and intercepted by […]
-
March 1, 2006 at 2:43 pm #3089761
Hacker?s Beware
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 1, 2006 at 6:38 pm #3089665
Hacker?s Beware
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 1, 2006 at 10:34 pm #3089589
Hacker?s Beware
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 2, 2006 at 2:41 am #3087843
Hacker?s Beware
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 2, 2006 at 6:43 am #3087693
Hacker?s Beware
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 2, 2006 at 10:41 am #3090524
Hacker?s Beware
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 2, 2006 at 12:19 pm #3090420
Hacker?s Beware
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 2, 2006 at 4:13 pm #3090291
Hacker?s Beware
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 2, 2006 at 4:13 pm #3090292
Political Risks Associated with Personal Information Storage
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
When we think of risks related to malicious hacking, we usually list financial ramifications. ?But as global information delivery changes, the risks are increasing in severity.?
This week, Google moved its search records from its Chinese site to the United States.? The reason stated for the move was the possibility that the Chinese government might […] -
March 2, 2006 at 8:19 pm #3090188
Hacker?s Beware
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 3, 2006 at 12:08 am #3090103
Hacker?s Beware
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 3, 2006 at 4:08 am #3090045
Hacker?s Beware
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 3, 2006 at 8:16 am #3089863
Hacker?s Beware
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 3, 2006 at 12:18 pm #3089360
Hacker?s Beware
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 3, 2006 at 4:10 pm #3089250
Hacker?s Beware
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 3, 2006 at 7:27 pm #3089175
Hacker?s Beware
by tolzak · about 18 years, 1 month ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 3, 2006 at 11:26 pm #3089104
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 4, 2006 at 3:30 am #3089057
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 4, 2006 at 7:38 am #3088991
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 4, 2006 at 11:33 am #3088931
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 4, 2006 at 3:31 pm #3088876
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 4, 2006 at 7:34 pm #3085776
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 4, 2006 at 7:34 pm #3085775
A Practical Approach to Threat Modeling
by tolzak · about 18 years ago
In reply to Adventures in Security
Today?s security management efforts are based on risk management principles.? In other words, security resources are applied to vulnerabilities that pose the greatest risk to the business. ?There are several processes for identifying and prioritizing risk.? One of the most effective is threat modeling.???????????
There has been much written about threat modeling.? But most of […] -
March 4, 2006 at 11:29 pm #3085725
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 5, 2006 at 3:29 am #3085689
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 5, 2006 at 7:33 am #3085636
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 5, 2006 at 7:33 am #3085635
Review our Podcast
by tolzak · about 18 years ago
In reply to Adventures in Security
In the past several weeks, we changed our format.? We’d like your opinion.? Please let us know if you like the new format or if a single host is better.? Also, let us know how we can improve.
You can either leave a blog comment or sent an email to tom.olzak@erudiosecurity.com.
Thanks for your support.
Podcasts –>
? -
March 5, 2006 at 11:32 am #3085579
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 5, 2006 at 3:30 pm #3085510
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 5, 2006 at 7:29 pm #3085077
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 5, 2006 at 11:31 pm #3085015
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 6, 2006 at 3:33 am #3084937
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 6, 2006 at 7:53 am #3084758
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 6, 2006 at 7:53 am #3084757
User Awareness Alert: Legal Worm
by tolzak · about 18 years ago
In reply to Adventures in Security
A new worm is working? its way throught the Internet.? Known as Bagle.do, the worm threatens email recipients with legal action if they don’t open the attached .exe file and respond to the sender.
?For the whole story, click here
?Listen to our Podcasts –>? ?
(User Awareness Alerts are a service provided by Erudio Security, LLC) -
March 6, 2006 at 11:45 am #3084608
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 6, 2006 at 3:41 pm #3084488
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 6, 2006 at 7:20 pm #3086104
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 6, 2006 at 11:16 pm #3086045
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 7, 2006 at 3:13 am #3085997
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 7, 2006 at 7:14 am #3085444
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 7, 2006 at 11:20 am #3085316
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 7, 2006 at 3:16 pm #3085157
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 7, 2006 at 3:16 pm #3085158
Email Authentication with Sender ID
by tolzak · about 18 years ago
In reply to Adventures in Security
In a February 14, 2006 article, I described the new Goodmail CertifiedEmail solution.? Goodmail provides a service to senders of marketing email that allows messages to bypass the normal spam filtering processes of email service providers like AOL.? The sender is charged a fee.? The objective of this for-fee service is to authenticate senders.???????
Sender ID […] -
March 7, 2006 at 3:16 pm #3085156
User Awareness Alert: New IM Malware
by tolzak · about 18 years ago
In reply to Adventures in Security
“An anti-virus vendor warned Tuesday that two new worms spreading on Microsoft’s and America Online’s instant messaging networks delete files and leave systems open to hijacking.
“Symantec posted alerts for the “Hotmatom” and “Maniccum” worms, and ranked both as a level “2″ threat. The Cupertino, Calif.-based security company uses a 1 through 5 scale to label […] -
March 7, 2006 at 7:16 pm #3087078
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 7, 2006 at 11:09 pm #3087013
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 8, 2006 at 3:09 am #3086962
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 8, 2006 at 7:26 am #3086855
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 8, 2006 at 11:16 am #3086699
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 8, 2006 at 3:17 pm #3086555
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 8, 2006 at 7:16 pm #3086472
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 8, 2006 at 11:07 pm #3086387
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 9, 2006 at 3:16 am #3086284
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 9, 2006 at 7:43 am #3084360
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 9, 2006 at 11:26 am #3084197
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 9, 2006 at 3:17 pm #3268042
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 9, 2006 at 7:29 pm #3267934
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 9, 2006 at 7:29 pm #3267933
New Training Page
by tolzak · about 18 years ago
In reply to Adventures in Security
We’ve added a new training page to our website.? The courses are free, and you can listen to them online or download them for personal or team viewing.
-
March 9, 2006 at 11:29 pm #3267852
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 10, 2006 at 3:30 am #3267806
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 10, 2006 at 7:46 am #3266911
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 10, 2006 at 11:38 am #3266756
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 10, 2006 at 1:40 pm #3267719
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 10, 2006 at 5:42 pm #3267622
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 10, 2006 at 9:29 pm #3267561
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 11, 2006 at 1:36 am #3267512
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
March 11, 2006 at 5:34 am #3267465
Hacker?s Beware
by tolzak · about 18 years ago
In reply to Adventures in Security
“Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]
-
May 22, 2006 at 2:26 pm #3158536
CipherTrust Toolbar to Protect Email Users
by tolzak · about 17 years, 10 months ago
In reply to Adventures in Security
Last week, I wrote a blog article about the growth of SPF and Sender ID technology in the fight against unwanted email (spam, phishing, etc.).? It appears that CipherTrust is taking advantage of its own implementation of these standards to help make the Internet a safer place ? at no cost.
On Monday, March 13, CipherTrust […] -
May 22, 2006 at 2:26 pm #3158537
Technical Security Alert: Rootkits can be hidden in virtual machines
by tolzak · about 17 years, 10 months ago
In reply to Adventures in Security
“Security researchers have uncovered new techniques to hide the presence of malware on infected systems. By hiding rootkit software in virtual machine environments, hackers have the potential to avoid detection by security software, boffins at Microsoft Research and the University of Michigan warn” (John Leyden, published 13 March 2006 in The Register).
View the rest of […] -
May 22, 2006 at 2:26 pm #3158538
User Awareness Alert: Open source digital signatures might be vulnerable
by tolzak · about 17 years, 10 months ago
In reply to Adventures in Security
“A pair of security bugs in cryptography software could allow an attacker to insert content into a digitally signed message or forge signatures on files.
“The flaws lie in the open-source GNU Privacy Guard software, also known as GnuPG and GPG, the GnuPG group said in two alerts. The software, a free replacement for the Pretty […] -
May 22, 2006 at 2:26 pm #3158539
DNS Cache Poisoning: Definition and Prevention
by tolzak · about 17 years, 10 months ago
In reply to Adventures in Security
The Internet would grind to a halt ? would not be possible ? without a Domain Name System (DNS).? As you?ll see in this paper, the proper operation of DNS is fundamental to the maintenance and distribution of the addresses for the vast number of nodes around the globe.? So it would be too much […]
-
May 22, 2006 at 2:26 pm #3158540
Writely: A great product with questionable security
by tolzak · about 17 years, 10 months ago
In reply to Adventures in Security
For those of you not familiar with Writely, it’s an online beta word processing service that provides the following services:
Create documents online
Upload documents from Word
Publish to the web
Post to your blog
Participate in online collaboration with people you specifyYes, it’s a great product with fantastic potential.? And now that Google has purchased the company, Upstartle, things […]
-
May 22, 2006 at 2:26 pm #3158541
User Awareness Alert: IE Exploit Strikes, Installs Spyware
by tolzak · about 17 years, 10 months ago
In reply to Adventures in Security
“The unpatched CreateTextRange vulnerability in Internet Explorer is already being used by at least one Web site to install spyware on users’ machines, a security organization said Friday.
“‘We just received a report that a particular site uses the vulnerability to install a spybot variant,’ the SANS Institute’s Internet Storm Center (ISC) warned Friday in an […] -
May 22, 2006 at 2:26 pm #3158542
Ransomware Password Revealed
by tolzak · about 17 years, 10 months ago
In reply to Adventures in Security
A trojan horse virus is spreading across the Internet that encrypts Word documents, spreadsheets, and databases.? It then leaves a file demanding $300 in return for the password necessary to decrypt the ransomed files.? However, Technicians at Sophos have extracted the password (yes, it looks like a path name):
C:\Program Files\Microsoft \Visual Studio\VC8
This kind of attack […] -
May 22, 2006 at 2:26 pm #3158531
Public Instant Messaging Scanning Service
by tolzak · about 17 years, 10 months ago
In reply to Adventures in Security
By?Cara Garretson,?Network World,?03/20/06
“Web security company ScanSafe this week plans to announce a new service aimed at protecting instant-messaging channels from viruses, spam, and other threats, as well as enforcing policies across this increasingly popular communications mechanism.”
Read the rest of the article?
Listen to our Podcasts –>
Free security training modules available at http://adventuresinsecurity.com/SCourses
? -
May 22, 2006 at 2:26 pm #3158532
My blog is moving
by tolzak · about 17 years, 10 months ago
In reply to Adventures in Security
Effective immediately, my blog is moving to ITToolbox.? You can see my new postings by going to
?????????????????????????????????? Adventures in Security Blog
-
-
AuthorReplies