Most security products fail to perform

Monday, November 16th, 2009

Nearly 80 percent of security products fail to perform as intended when first tested and generally require two or more cycles of testing before achieving certification, according to a new ICSA Labs report. The “ICSA Labs Product Assurance Report” - co-authored by the Verizon Business Data Breach Investigations Report research ...

Researcher busts into Twitter via SSL reneg hole

Saturday, November 14th, 2009

A Swiss grad student has devised a serious, real-world attack on Twitter that targeted a recently discovered vulnerability in the secure sockets layer protocol.The exploit by Anil Kurmus is significant because it successfully targeted the so-called SSL renegotiation bug to steal Twitter login credentials that passed through encrypted data streams. ...

New Flash Attack Has No Real ‘Fix’

Friday, November 13th, 2009

Researchers have discovered a new attack that exploits the way browsers operate with Adobe Flash -- and there's no simple patch for it. The attack can occur on Websites that accept user-generated content -- anything from Webmail to social networking sites. An attacker basically takes advantage of the fact that a ...

HookSafe Rootkit Protection

Wednesday, November 11th, 2009

Scientists are set to unveil a lightweight system they say makes an operating system significantly more resistant to rootkits without degrading its performance.The hypervisor-based system is dubbed HookSafe, and it works by relocating kernel hooks in a guest OS to a dedicated page-aligned memory space that's tightly locked down. The ...

Is Antivirus Dead?

Tuesday, November 10th, 2009

Security is never black and white. If someone asks, "for best security, should I do A or B?" the answer almost invariably is both. But security is always a trade-off. Often it's impossible to do both A and B -- there's no time to do both, it's too expensive to ...