Tuesday, July 1st, 2008
Sophos announced today that it has published a new white paper describing how businesses can tackle the growing challenge of data leaking by enforcing an acceptable use policy, by applying appropriate controls already available in existing security solutions.
The white paper, entitled "Stopping data leakage: Exploiting your existing security investment", examines ...
Posted in General BS, Internet, Networking, Privacy, Security | No Comments
Tuesday, July 1st, 2008
So you're thinking, "Hey, I want to be totally irresponsible with my computer and load it up with crapware!" Really, isn't everyone getting tired of having to be so stinking responsible on the Internet all the time? We certainly are. We're ready for system protection that isn't afraid of our ...
Posted in Internet, Privacy, Security, Windows | No Comments
Tuesday, July 1st, 2008
Our research team has identified a web-based attack technique that exploits the growing number of applications that require a web server being run on a local machine. Cross-Environment Hopping (CEH) is a result of this trend combined with the current limitations in browsers’ same-origin policy access restrictions.
The CEH technique enables ...
Posted in Coding, Internet, Networking, Privacy, Security | No Comments
Tuesday, July 1st, 2008
Experts at SophosLabs™, Sophos's global network of virus, spyware and spam analysis centers, have welcomed news that a teenager has confessed to controlling thousands of computers in an illegal botnet.19-year-old Jason Michael Milmont, of Cheyenne, Wyoming, has admitted to being the programmer of the Nugache malware which infected Windows computers, ...
Posted in Internet, Privacy, Security | No Comments
Tuesday, July 1st, 2008
Italian researchers have published a paper on the Detection of Encrypted Tunnels across Network Boundaries. I came across it in a google search because I’ve been thinking of writing a program which does something similar. It doesn’t seem like anyone else has picked up on this research yet so I ...
Posted in Internet, Linux, Networking, Privacy, Security | No Comments