DIY Identity-Theft Protection: A 12-Step Program

Thursday, May 15th, 2008

You don't have to spend $100 to $200 a year to defend yourself from identity theft at the level of protection that a paid service offers. You can do almost everything the services do, for free. But following these steps will require time and effort. Get a free copy of your ...

Three-Layer Encryption Method Awarded Patent

Thursday, May 15th, 2008

Eruces Data Security has secured a patent for its three-step encryption and key management scheme, which is designed to lock down data through its lifecycle. The security firm’s so-called Tricryption technology first encrypts the data itself with symmetric keys, and then encrypts the keys and stores them in a central key ...

Top 10 Popular Passwords

Thursday, May 15th, 2008

If you want to be stylish and liked, go with what’s popular. But if you want security, using the most popular passwords are a sure way to leave hackers an easy way into your accounts. Apparently, a whopping 20% of people use some variant of the following 10 password choices, ...

Hacker writes rootkit for Cisco’s routers

Thursday, May 15th, 2008

A security researcher has developed malicious rootkit software for Cisco's routers, a development that has placed increasing scrutiny on the routers that carry the majority of the Internet's traffic. Sebastian Muniz, a researcher with Core Security Technologies, developed the software, which he will unveil on May 22 at the ...

Admins warned of brute-force SSH attacks

Wednesday, May 14th, 2008

Over the weekend, a number of network administrators issued warnings over an order-of-magnitude increase in the number of attempts to guess the username and password of systems running secure shell (SSH), the encrypted access method that replaced the common telnet service. System administrators at universities and some companies have reported ...