Thursday, May 15th, 2008
You don't have to spend $100 to $200 a year to defend yourself from identity theft at the level of protection that a paid service offers. You can do almost everything the services do, for free. But following these steps will require time and effort.
Get a free copy of your ...
Posted in General BS, Internet, Privacy, Security | No Comments
Thursday, May 15th, 2008
Eruces Data Security has secured a patent for its three-step encryption and key management scheme, which is designed to lock down data through its lifecycle.
The security firm’s so-called Tricryption technology first encrypts the data itself with symmetric keys, and then encrypts the keys and stores them in a central key ...
Posted in Internet, Privacy, Security | No Comments
Thursday, May 15th, 2008
If you want to be stylish and liked, go with what’s popular. But if you want security, using the most popular passwords are a sure way to leave hackers an easy way into your accounts. Apparently, a whopping 20% of people use some variant of the following 10 password choices, ...
Posted in General BS, Internet, Privacy, Security | No Comments
Thursday, May 15th, 2008
A security researcher has developed malicious rootkit software for Cisco's routers, a development that has placed increasing scrutiny on the routers that carry the majority of the Internet's traffic.
Sebastian Muniz, a researcher with Core Security Technologies, developed the software, which he will unveil on May 22 at the ...
Posted in Hardware, Internet, Networking, Security, Software | No Comments
Wednesday, May 14th, 2008
Over the weekend, a number of network administrators issued warnings over an order-of-magnitude increase in the number of attempts to guess the username and password of systems running secure shell (SSH), the encrypted access method that replaced the common telnet service. System administrators at universities and some companies have reported ...
Posted in Internet, Linux, Networking, Security, Software | No Comments