General discussion

  • Creator
    Topic
  • #2192411

    Adventures in Security

    Locked

    by tolzak ·

    blog root

All Comments

  • Author
    Replies
    • #3093439

      Securing VoIP

      by tolzak ·

      In reply to Adventures in Security

      ?
      Voice over IP, also known as VoIP, is quickly growing in popularity. Organizations are initially attracted to this relatively new technology because of its lower per call costs when compared to traditional voice services.? But they soon realize that VoIP provides additional value.

      Unified messaging, though still in its infancy, is introduced into the enterprise.? Users […]

    • #3093435

      Deleted Data Files Aren?t?

      by tolzak ·

      In reply to Adventures in Security

      Deleted files on retired hard drives might be a law suit waiting to happen.? Deleting a file from a disk isn’t enough to wipe the actual information.??In Windows, deleting a file simply tells the operating system it can reallocate the space the file currently occupies.? The file no longer shows up in a folder listing, […]

    • #3093436

      The Fundamentals of Keystroke Logging

      by tolzak ·

      In reply to Adventures in Security

      This month, hackers in China attempted to place keystroke loggers onto UK Parliament systems via email messages. ?Phishing attacks in which keystroke loggers are installed on PCs are becoming more frequent. ?Keystroke loggers are also popular among hackers whose attack vector of choice is instant messaging. ?Because of the growth in the rate of keystroke […]

    • #3093437

      Peer-to-Peer IP Telephony Security Challenges

      by tolzak ·

      In reply to Adventures in Security

      Peer-to-peer?VoIP phone services provide an inexpensive alternative to traditional switched services.? So?many businesses are looking?at ways to implement this Internet-based functionality.? Before you?make a decision to toss out the old and bring in the new, it’s important to understand the risks associated with Internet phone service.?
      Since Skype is the unquestioned leader in this?space, I’ll use?it […]

    • #3093438

      An Intrusion Defense Solution

      by tolzak ·

      In reply to Adventures in Security

      Rather than write another piece on security in general for today’s post, I’m going to share my team’s experience in selecting an intrusion defense solution that expands on our existing firewall perimeter defense.? During the past several weeks, my team and I?struggled with the new infrastructure and management design to support our enterprise security strategy.? […]

    • #3093430

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3093431

      Managing Unapproved Applications

      by tolzak ·

      In reply to Adventures in Security

      In today’s workplace, users aren’t satisfied with the applications provided by the internal IS staff.? In an effort to maximize their productivity and to improve their work environment (at?least those are the reasons given), many users install applications brought in from home, downloaded from the Internet, or provided by a friend.? So if it makes […]

    • #3093432

      Desktop Security Service – Windows OneCare

      by tolzak ·

      In reply to Adventures in Security

      In the spring of 2005, OneCare was released with much fanfare.? It’s Microsoft’s venture into the world of desktop security.? But it comes with a twist.? Microsoft’s solution is a software-as-a-service offering.? This means that you will probably pay a monthly fee for the rights to run the combined anti-virus, backup, cleanup, and update services.? […]

    • #3093433

      Dissecting Nyxem: New dog, same old tricks.

      by tolzak ·

      In reply to Adventures in Security

      There has been some real buzz concerning a new virus in the wild, Nyxem. While it employs the same old tricks virus coders have been using for years, it has a new nasty ending. Let’s discuss Nyxem (aka Mywife, Blueworm, BlackMal) and see what kind of risk we are really looking at.

      How does this work?
      The […]

    • #3093434

      Data Storage Security

      by tolzak ·

      In reply to Adventures in Security

      Data in transit, across and between company networks, is usually the focus of extensive security efforts.? However, organizations typically regard data residing on internal storage devices as “secure enough.”? Databases and flat files stored on server, laptop, or SAN-attached disks don’t always move outside the security perimeter; so why worry?
      In this paper, we’ll explore data […]

    • #3093379

      Deleted Data Files Aren?t?

      by tolzak ·

      In reply to Adventures in Security

      Deleted files on retired hard drives might be a law suit waiting to happen.? Deleting a file from a disk isn’t enough to wipe the actual information.??In Windows, deleting a file simply tells the operating system it can reallocate the space the file currently occupies.? The file no longer shows up in a folder listing, […]

    • #3093376

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3093326

      Deleted Data Files Aren?t?

      by tolzak ·

      In reply to Adventures in Security

      Deleted files on retired hard drives might be a law suit waiting to happen.? Deleting a file from a disk isn’t enough to wipe the actual information.??In Windows, deleting a file simply tells the operating system it can reallocate the space the file currently occupies.? The file no longer shows up in a folder listing, […]

    • #3093327

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3093155

      Deleted Data Files Aren?t?

      by tolzak ·

      In reply to Adventures in Security

      Deleted files on retired hard drives might be a law suit waiting to happen.? Deleting a file from a disk isn’t enough to wipe the actual information.??In Windows, deleting a file simply tells the operating system it can reallocate the space the file currently occupies.? The file no longer shows up in a folder listing, […]

    • #3093156

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3093154

      Security Risk Management

      by tolzak ·

      In reply to Adventures in Security

      Risk management is an important part of securing today’s information assets.? Security has moved from the fringes of technology to take its place alongside other critical business activities.? And like other business activities, the resources expended on?the people, processes, and technology necessary to protect an organization’s information infrastructure must be justified in terms of return […]

    • #3093013

      Deleted Data Files Aren?t?

      by tolzak ·

      In reply to Adventures in Security

      Deleted files on retired hard drives might be a law suit waiting to happen.? Deleting a file from a disk isn’t enough to wipe the actual information.??In Windows, deleting a file simply tells the operating system it can reallocate the space the file currently occupies.? The file no longer shows up in a folder listing, […]

    • #3093014

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3133156

      Deleted Data Files Aren?t?

      by tolzak ·

      In reply to Adventures in Security

      Deleted files on retired hard drives might be a law suit waiting to happen.? Deleting a file from a disk isn’t enough to wipe the actual information.??In Windows, deleting a file simply tells the operating system it can reallocate the space the file currently occupies.? The file no longer shows up in a folder listing, […]

    • #3133155

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3133041

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3133042

      Windows OneCare Live Cost Revealed

      by tolzak ·

      In reply to Adventures in Security

      Late last week I wrote about the beta version of OneCare Live.? At that time, Microsoft hadn’t released?when it would role out the production release or how much it would cost.? Today, Microsoft announced that it would provide OneCare for $49.95 a year starting this June.? The annual price includes using the desktop security service […]

    • #3133007

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3132863

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3092475

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3092375

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3092318

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3092294

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3092232

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3093692

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3093691

      Application Security: People, Process, and Technology

      by tolzak ·

      In reply to Adventures in Security

      Most organizations have worked feverishly to secure the network infrastructure, including?executing rigorous operating system?patch and configuration management processes.? They’ve done such a good job, attackers are turning to applications as the next avenue of attack.? This includes both?commercial and?proprietary solutions.
      In this article, we’ll look at the challenges facing managers as they implement commercial applications and […]

    • #3092104

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3091948

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3253913

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3253853

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3253810

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3091005

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3091006

      University of Washington Spyware Study Results

      by tolzak ·

      In reply to Adventures in Security

      In a recent University of Washington?paper (see Sources below), the results of a five month study (May 2005?to October 2005)?of the state of spyware on the Internet were documented.? The following is a summary of the researchers’ conclusions:

      In October 2005, the researchers crawled 20 million URLs.? Of that number, 19% contained executable programs.??5.5% of the […]

    • #3090947

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3090928

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3090903

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3077925

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3077875

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3077846

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3077828

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3077811

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3077764

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3077726

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3077704

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3133819

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3133818

      Invasion of the Botnet Armies

      by tolzak ·

      In reply to Adventures in Security

      In previous articles, I wrote about? malicious hackers (crackers)?moving away from attacks for bragging rights to attacks for profit.? Part of this transition is the increased use of zombie PCs, or bots, to surreptitiously acquire personal and business information with criminal intent.? In this article, I describe the nature of bots and botnets, the danger […]

    • #3133763

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3133730

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3133690

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3091840

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3091710

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3091586

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3253334

      BIOS Rootkit Attacks: What?s the Real Risk?

      by tolzak ·

      In reply to Adventures in Security

      As I’ve written in previous articles, the frequency of malicious rootkit installations is increasing.? Now it seems that even the BIOS is a potential target.? John Heasman, principle security consultant for Next-Generation Security Software, announced this week that a collection of functions known as the Advanced Configuration and Power Interface (ACPI) could be used to […]

    • #3253118

      Goodmail Systems CertifiedEmail: What is it, and why all the fuss?

      by tolzak ·

      In reply to Adventures in Security

      Last month, AOL announced it was beginning?to use a certified email system designed by Goodmail Systems.? Basically, the Goodmail solution?attaches an encrypted?token to business/marketing email from certified businesses.? When AOL sees the token, and validates it, the email is treated as a non-spam message.? The catch for the sender is a small fee per message.? […]

    • #3252245

      eDiscovery Challenges

      by tolzak ·

      In reply to Adventures in Security

      During the past two decades, the shift from paper to electronic filing of business documents introduced a new challenge: meeting the requirements of litigation discovery.? Not only are organizations keeping more information; the vast amounts of email messages and other types of documents are typically not organized in a way that facilitates quick, cost effective […]

    • #3102064

      Laptop Encryption: Reasonable and Appropriate?

      by tolzak ·

      In reply to Adventures in Security

      Senior U.S. District Judge for the District of Minnesota, the Honorable Richard H. Kyle, ruled last week that companies don’t have to encrypt their data as a requirement of the Gramm-Leach-Bliley Act of 1999.? The GLBA places a set of constraints on how financial insitutions should handle customer information.? There’s been plenty of coverage on […]

    • #3102767

      Security Critical Success Factors

      by tolzak ·

      In reply to Adventures in Security

      Within the context of information security, Critical Success Factors (CSFs) are objectives or goals that must be met before an organization can provide reasonable and appropriate protection of its information assets.? In this article, I explore seven CSFs that lead to an acceptable level of information asset assurance.
      1.? Management support.? The support of all levels […]

    • #3101613

      Review: Surf Control ETS (Enterprise Threat Shield)

      by tolzak ·

      In reply to Adventures in Security

      From a security and a general IT perspective there is a not so new and growing threat, unauthorized software. Call it what you like, spyware, adware, malware. The simple fact remains that if it is unsupported and was not installed by the IT staff, it could potentially wreak havoc on your environment. I’m going to […]

    • #3100609

      Unified Internet Identity Management

      by tolzak ·

      In reply to Adventures in Security

      Microsoft?s new Windows project, code named Longhorn, is supposed to bring many improvements to the enterprise.? Not the least of which is better overall security.? But possibly the most interesting development is Microsoft?s recent announcement about changes to Active Directory.? These changes not only impact how user authentication and authorization are handled in your network.? […]

    • #3272364

      Sorting through the Security-in-the-cloud Debate

      by tolzak ·

      In reply to Adventures in Security

      There?s a lot of talk these days about security-in-the-cloud.? Security-in-the-cloud is generally defined as protection provided by Internet Service Providers (ISP) that results in only ?clean? packets arriving at a subscriber?s perimeter.? Positions on the topic range from ?it?s a bad idea? to ?give everything over to a managed service provider.?? Based on my experience […]

    • #3272847

      IP Surveillance

      by tolzak ·

      In reply to Adventures in Security

      When managers discuss physical security, it?s usually restricted to what types of locks to place on what doors. ?This is a good start, but locks are only one component of effective physical security. ?In fact, a lock is intended as one of many safeguards to delay an intruder until he is identified and intercepted by […]

    • #3089761

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3089665

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3089589

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3087843

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3087693

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3090524

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3090420

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3090291

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3090292

      Political Risks Associated with Personal Information Storage

      by tolzak ·

      In reply to Adventures in Security

      When we think of risks related to malicious hacking, we usually list financial ramifications. ?But as global information delivery changes, the risks are increasing in severity.?
      This week, Google moved its search records from its Chinese site to the United States.? The reason stated for the move was the possibility that the Chinese government might […]

    • #3090188

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3090103

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3090045

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3089863

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3089360

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3089250

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3089175

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3089104

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3089057

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3088991

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3088931

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3088876

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3085776

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3085775

      A Practical Approach to Threat Modeling

      by tolzak ·

      In reply to Adventures in Security

      Today?s security management efforts are based on risk management principles.? In other words, security resources are applied to vulnerabilities that pose the greatest risk to the business. ?There are several processes for identifying and prioritizing risk.? One of the most effective is threat modeling.???????????
      There has been much written about threat modeling.? But most of […]

    • #3085725

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3085689

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3085636

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3085635

      Review our Podcast

      by tolzak ·

      In reply to Adventures in Security

      In the past several weeks, we changed our format.? We’d like your opinion.? Please let us know if you like the new format or if a single host is better.? Also, let us know how we can improve.
      You can either leave a blog comment or sent an email to tom.olzak@erudiosecurity.com.
      Thanks for your support.
      Podcasts –>
      ?

    • #3085579

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3085510

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3085077

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3085015

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3084937

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3084758

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3084757

      User Awareness Alert: Legal Worm

      by tolzak ·

      In reply to Adventures in Security

      A new worm is working? its way throught the Internet.? Known as Bagle.do, the worm threatens email recipients with legal action if they don’t open the attached .exe file and respond to the sender.
      ?For the whole story, click here
      ?Listen to our Podcasts –>? ?
      (User Awareness Alerts are a service provided by Erudio Security, LLC)

    • #3084608

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3084488

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3086104

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3086045

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3085997

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3085444

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3085316

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3085157

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3085158

      Email Authentication with Sender ID

      by tolzak ·

      In reply to Adventures in Security

      In a February 14, 2006 article, I described the new Goodmail CertifiedEmail solution.? Goodmail provides a service to senders of marketing email that allows messages to bypass the normal spam filtering processes of email service providers like AOL.? The sender is charged a fee.? The objective of this for-fee service is to authenticate senders.???????
      Sender ID […]

    • #3085156

      User Awareness Alert: New IM Malware

      by tolzak ·

      In reply to Adventures in Security

      “An anti-virus vendor warned Tuesday that two new worms spreading on Microsoft’s and America Online’s instant messaging networks delete files and leave systems open to hijacking.
      “Symantec posted alerts for the “Hotmatom” and “Maniccum” worms, and ranked both as a level “2″ threat. The Cupertino, Calif.-based security company uses a 1 through 5 scale to label […]

    • #3087078

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3087013

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3086962

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3086855

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3086699

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3086555

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3086472

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3086387

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3086284

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3084360

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3084197

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3268042

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3267934

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3267933

      New Training Page

      by tolzak ·

      In reply to Adventures in Security

      We’ve added a new training page to our website.? The courses are free, and you can listen to them online or download them for personal or team viewing.

    • #3267852

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3267806

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3266911

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3266756

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3267719

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3267622

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3267561

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3267512

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3267465

      Hacker?s Beware

      by tolzak ·

      In reply to Adventures in Security

      “Quantum cryptography is trying to make all transmissions secure, so this could be very useful for online banking, for example,” says Professor Hoi-Kwong Lo, an expert in physics and electrical and computer engineering at U of T’s Centre for Quantum Information and Quantum Control and the senior author of a new study about the technique. […]

    • #3158536

      CipherTrust Toolbar to Protect Email Users

      by tolzak ·

      In reply to Adventures in Security

      Last week, I wrote a blog article about the growth of SPF and Sender ID technology in the fight against unwanted email (spam, phishing, etc.).? It appears that CipherTrust is taking advantage of its own implementation of these standards to help make the Internet a safer place ? at no cost.
      On Monday, March 13, CipherTrust […]

    • #3158537

      Technical Security Alert: Rootkits can be hidden in virtual machines

      by tolzak ·

      In reply to Adventures in Security

      “Security researchers have uncovered new techniques to hide the presence of malware on infected systems. By hiding rootkit software in virtual machine environments, hackers have the potential to avoid detection by security software, boffins at Microsoft Research and the University of Michigan warn” (John Leyden, published 13 March 2006 in The Register).
      View the rest of […]

    • #3158538

      User Awareness Alert: Open source digital signatures might be vulnerable

      by tolzak ·

      In reply to Adventures in Security

      “A pair of security bugs in cryptography software could allow an attacker to insert content into a digitally signed message or forge signatures on files.
      “The flaws lie in the open-source GNU Privacy Guard software, also known as GnuPG and GPG, the GnuPG group said in two alerts. The software, a free replacement for the Pretty […]

    • #3158539

      DNS Cache Poisoning: Definition and Prevention

      by tolzak ·

      In reply to Adventures in Security

      The Internet would grind to a halt ? would not be possible ? without a Domain Name System (DNS).? As you?ll see in this paper, the proper operation of DNS is fundamental to the maintenance and distribution of the addresses for the vast number of nodes around the globe.? So it would be too much […]

    • #3158540

      Writely: A great product with questionable security

      by tolzak ·

      In reply to Adventures in Security

      For those of you not familiar with Writely, it’s an online beta word processing service that provides the following services:

      Create documents online
      Upload documents from Word
      Publish to the web
      Post to your blog
      Participate in online collaboration with people you specify

      Yes, it’s a great product with fantastic potential.? And now that Google has purchased the company, Upstartle, things […]

    • #3158541

      User Awareness Alert: IE Exploit Strikes, Installs Spyware

      by tolzak ·

      In reply to Adventures in Security

      “The unpatched CreateTextRange vulnerability in Internet Explorer is already being used by at least one Web site to install spyware on users’ machines, a security organization said Friday.
      “‘We just received a report that a particular site uses the vulnerability to install a spybot variant,’ the SANS Institute’s Internet Storm Center (ISC) warned Friday in an […]

    • #3158542

      Ransomware Password Revealed

      by tolzak ·

      In reply to Adventures in Security

      A trojan horse virus is spreading across the Internet that encrypts Word documents, spreadsheets, and databases.? It then leaves a file demanding $300 in return for the password necessary to decrypt the ransomed files.? However, Technicians at Sophos have extracted the password (yes, it looks like a path name):
      C:\Program Files\Microsoft \Visual Studio\VC8
      This kind of attack […]

    • #3158531

      Public Instant Messaging Scanning Service

      by tolzak ·

      In reply to Adventures in Security

      By?Cara Garretson,?Network World,?03/20/06
      “Web security company ScanSafe this week plans to announce a new service aimed at protecting instant-messaging channels from viruses, spam, and other threats, as well as enforcing policies across this increasingly popular communications mechanism.”
      Read the rest of the article?
      Listen to our Podcasts –>
      Free security training modules available at http://adventuresinsecurity.com/SCourses
      ?

    • #3158532

      My blog is moving

      by tolzak ·

      In reply to Adventures in Security

      Effective immediately, my blog is moving to ITToolbox.? You can see my new postings by going to
      ?????????????????????????????????? Adventures in Security Blog

Viewing 142 reply threads