Friday, August 1st, 2008
A security expert who helped pioneer some of the research behind the recent cold-boot attack discovery by researchers at Princeton University will reveal next week at Black Hat USA the technical details of methods he developed for protecting an encrypted laptop from the hack.The software-based techniques defend against so-called cold ...
Posted in Hardware, Privacy, Security | No Comments
Sunday, June 29th, 2008
Plenty of USB storage keys are on the market, but Ironkey is the first to use military level encryption. Sold in 1GB, 2GB, and 4GB sizes, the key features a processor called the Cryptochip, which uses Public Key Cryptography ciphers linked to an online account to create encryption keys on ...
Posted in Hardware, Networking, Privacy, Security | No Comments
Monday, June 23rd, 2008
A new generation of malware alware that looks for passwords to online games has emerged – and its success rates are stunning. Last patch Tuesday, Microsoft added special detection functions for two contaminants called Taterf and Frethog to its Malicious Software Removal Tool (MSRT). The results sent back to Redmond ...
Posted in Internet, Privacy, Security | No Comments
Wednesday, May 28th, 2008
I used to joke about the client that once told me their management mandated “double encryption” on all financial information after a breach. In their case, they were encrypting their database and backup tapes. Not that there isn’t a valid reason to encrypt databases and backup tapes, but the way ...
Posted in Security | No Comments
Wednesday, May 28th, 2008
If you troubleshoot Windows PCs for fun or profit, then chances are you’ve used one or more tools from Sysinternals. Microsoft bought the company and its amazing library of diagnostic, troubleshooting, and management utilities in 2006, and the collection has been continually updated ever since. It’s also still completely free.
A few weeks ...
Posted in General BS, Internet, Software, Windows | No Comments
Page 6 of 11« First«...45678...»Last »