Thursday, December 17th, 2009
Secure64, which specializes in products designed to support the domain name system (DNS), has released the product to help prevent a condition in which the server's local list of domain name mappings is corrupted. Attackers create this condition by pretending to be another DNS server responding to a DNS query.
One ...
Posted in Hardware, Internet, Networking, Security | No Comments
Monday, November 16th, 2009
Nearly 80 percent of security products fail to perform as intended when first tested and generally require two or more cycles of testing before achieving certification, according to a new ICSA Labs report. The “ICSA Labs Product Assurance Report” - co-authored by the Verizon Business Data Breach Investigations Report research ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Friday, October 16th, 2009
Let’s quickly recap the Evil Maid Attack. The scenario we consider is when somebody left an encrypted laptop e.g. in a hotel room. Let’s assume the laptop uses full disk encryption like e.g. this provided by TrueCrypt or PGP Whole Disk Encryption.
Many people believe, including some well known security experts, ...
Posted in Hardware, Internet, Linux, Networking, Privacy, Security, Software, Windows | No Comments
Thursday, October 8th, 2009
VirtualBox is a general-purpose full virtualizer for x86 hardware. Targeted at server, desktop and embedded use, it is now the only professional-quality virtualization solution that is also Open Source Software.
Sun today released VirtualBox 3.0.8, a maintenance release of VirtualBox 3.0 which improves stability and performance.
Download:
http://www.virtualbox.org/wiki/Downloads
ChangeLog:
http://www.virtualbox.org/wiki/Changelog
Posted in Hardware, Internet, Networking, Privacy, Security, Software | No Comments
Monday, September 28th, 2009
In computer security, a lot of effort is spent on the authentication problem. Whether it's passwords, secure tokens, secret questions, image mnemonics, or something else, engineers are continually coming up with more complicated—and hopefully more secure—ways for you to prove you are who you say you are over the Internet.
This ...
Posted in Hardware, Internet, Linux, Security, Windows | No Comments