Thursday, May 1st, 2008
The fundamental problem with two factor (2FA) session authentication is that the approach is vulnerable to Man in the Middle and Man in the Browser attacks. 2FA requires that customers present not only a password (something they know) when they log into online banking, but also demonstrate that they possess ...
Posted in Internet, Privacy, Security | No Comments
Thursday, May 1st, 2008
Security's rising star, Webroot, plans to offer web and malware filtering as a service to SMBs, the first vendor of any size to offer such a capability in subscription form.
The software-as a service (SaaS) model, which extends the email filtering service already offered by the company, will appeal to smaller ...
Posted in Internet, Privacy, Security, Software | No Comments
Thursday, May 1st, 2008
I am pretty sure that there are a number of you out there reading this blog over a wireless network. Given that wireless is so widely distributed these days, its not uncommon that users are unaware of how insecure their wireless setup maybe.
Unfortunately one other reality is that a number ...
Posted in Hardware, Internet, Privacy, Security, Software | No Comments
Thursday, May 1st, 2008
IT and security control firm Sophos is urging internet users to take the Sophos Spam Pledge and put an end to the significant problems that many businesses face on a daily basis, as spam marks its 30th anniversary today. The first ever spam message was sent on 1st May ...
Posted in Internet, Privacy | No Comments
Wednesday, April 30th, 2008
As the world of virtualization moves forward, organisations are faced with compelling reasons to virtualize: factors like server consolidation, high energy bills, faster hardware, ease of use and step back and quick snapshot technology make the virtual computing realm become more attractive.
In some organisations virtualization has already become a large ...
Posted in Hardware, Internet, Networking, Privacy, Security, Software | No Comments