Thursday, May 8th, 2008
It takes the average attacker less than 10 seconds to hack in and out of a database -- hardly enough time for the database administrator even notice the intruder. So it’s no surprise that many database attacks go unnoticed by organizations until long after the data has been compromised.
And surprisingly, ...
Posted in Internet, Security | No Comments
Friday, May 2nd, 2008
IronKey Inc., maker of the world's most secure flash drive, announced today availability of the
8GB-capacity of its IronKey secure USB devices. IronKey brings unprecedented mobile data convenience and security to individuals and organizations with its rugged, waterproof and tamper resistant USB drives that include always-on hardware encryption, strong authentication, portable ...
Posted in Hardware, Privacy, Security | No Comments
Thursday, May 1st, 2008
The fundamental problem with two factor (2FA) session authentication is that the approach is vulnerable to Man in the Middle and Man in the Browser attacks. 2FA requires that customers present not only a password (something they know) when they log into online banking, but also demonstrate that they possess ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, April 29th, 2008
It's long been assumed that Microsoft has built in various "backdoors" for law enforcement to get around its own security, but now reader Kevin Stapp writes in to let us know that the company has also been literally handing out the keys to law enforcement. Apparently, they're giving out special ...
Posted in Hardware, Privacy, Security, Windows | No Comments
Tuesday, April 29th, 2008
The latest versions of fgdump and pwdump have been released by the foofus.net team. Looks like the most important change is that both tools support 64-bit targets. Here is the official announcement:
"The foofus.net team is pleased to announce updates to both fgdump (2.0.0) and pwdump (1.7.1), which incorporate a number ...
Posted in Coding, Linux, Privacy, Security | 1 Comment