Monday, November 16th, 2009
Nearly 80 percent of security products fail to perform as intended when first tested and generally require two or more cycles of testing before achieving certification, according to a new ICSA Labs report. The “ICSA Labs Product Assurance Report” - co-authored by the Verizon Business Data Breach Investigations Report research ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Saturday, November 14th, 2009
A Swiss grad student has devised a serious, real-world attack on Twitter that targeted a recently discovered vulnerability in the secure sockets layer protocol.The exploit by Anil Kurmus is significant because it successfully targeted the so-called SSL renegotiation bug to steal Twitter login credentials that passed through encrypted data streams. ...
Posted in Internet, Networking, Privacy, Security | No Comments
Friday, November 13th, 2009
Researchers have discovered a new attack that exploits the way browsers operate with Adobe Flash -- and there's no simple patch for it.
The attack can occur on Websites that accept user-generated content -- anything from Webmail to social networking sites. An attacker basically takes advantage of the fact that a ...
Posted in Internet, Security | No Comments
Wednesday, November 11th, 2009
Scientists are set to unveil a lightweight system they say makes an operating system significantly more resistant to rootkits without degrading its performance.The hypervisor-based system is dubbed HookSafe, and it works by relocating kernel hooks in a guest OS to a dedicated page-aligned memory space that's tightly locked down. The ...
Posted in Linux, Security, Software | No Comments
Tuesday, November 10th, 2009
Security is never black and white. If someone asks, "for best security, should I do A or B?" the answer almost invariably is both. But security is always a trade-off. Often it's impossible to do both A and B -- there's no time to do both, it's too expensive to ...
Posted in Internet, Security | No Comments