Thursday, June 2nd, 2011
As has been widely reported, high profile users of Gmail - including US government officials, reporters and political activists - have had their email accounts hacked.
This wasn't a sophisticated attack against Google's systems, but rather a cleverly-crafted HTML email which pointed to a Gmail phishing page. Victims would believe that ...
Posted in Internet, Privacy, Security | No Comments
Monday, May 23rd, 2011
NSA has developed and distributed configuration guidance for operating systems. These guides are currently being used throughout the government and by numerous entities as a security baseline for their systems.
Source:
http://www.nsa.gov/ia/guidance/security_configuration_guides/operating_systems.shtml
Posted in Internet, Security | No Comments
Monday, May 9th, 2011
A French security research firm boasted today that it has discovered a two-step process for defeating Google Chrome‘s sandbox, the security technology designed to protect the browser from being compromised by previously unknown security flaws. Experts say the discovery, if true, marks the first time hackers have figured out a ...
Posted in Internet, Security | No Comments
Wednesday, May 4th, 2011
We take a close look at our logs and try to explain every anomaly we see. Tuesday morning we saw a network traffic anomaly for a few minutes from one of our non-critical machines. These happen occasionally, and we typically identify them as an employee or an automated script.
In this ...
Posted in Internet, Privacy, Security, Software | No Comments
Thursday, April 28th, 2011
A new data storage technique provides security, as well as plausible deniability. Whereas encrypted data can be easily spotted--if not necessarily decrypted, without obtaining the decryption keys from the device owner--the new technique disguises stored data as random disk fragmentation. When implemented correctly, a digital forensic investigator might not even ...
Posted in Hardware, Privacy, Security | No Comments