Have A Secure Summer Vacation
With summer now here officially, many of you are most likely planning vacations, and you probably want to be able to connect to the Internet during your vacation. But how do you do this securely?
Protecting SSH From The Masses
SSH brute-force attacks are not uncommon against computer systems sitting on public IP addresses. Script kiddies and botnet-infected systems are scanning the Internet looking for low-hanging fruit (think: weak passwords) to leverage for additional attacks, website defacements, or attack-tool storage.
Keeping Data Forever vs. Data Retention
Keeping data forever vs. data retention is going to become an increasingly fierce battle. In the past data retention strategies always won but as we discussed in our first entry in the series the technology is now available to store data forever and as we discussed in the second entry the technology is there to find it when you need it.
The Failure Of Cryptography To Secure Modern Networks
For a while now, I've pointed out that cryptography is singularly ill-suited to solve the major network security problems of today: denial-of-service attacks, website defacement, theft of credit card numbers, identity theft, viruses and worms, DNS attacks, network penetration, and so on.
Google China Redirection To End
Chinese authorities don't appreciate Google's practice of sending searchers in China to its uncensored Hong Kong search site.
Android, iPhone, "Kill Switch" Capabilities
The recent security related events surrounding Google Android highlights why users must exercise constant vigilance in the applications they choose to install on their handsets, and raises questions about the ability for vendors to reach into your handset to remove potentially nasty software.
PayPal Allows Apps To Accept Payment
Guest Payments, part of the PayPal Adaptive Payments API, allows developers to offer direct credit card payment in applications with requiring PayPal membership.
There's No (New) Internet Kill Switch
The Lieberman-Collins cybersecurity bill passed out of the Senate Homeland Security and Governmental Affairs Committee on Thursday to await consideration by the full Senate. But not everyone is satisfied with what it says.
The Types Of SSD Cache
In our last entry we discussed the value of using solid state disk (SSD) as a cache, which provides a simpler on-ramp to the accelerated world of SSD. With SSD cache there are no or limited changes needed to applications and using SSD as a cache does not require a large capacity investment in the more premium priced technology.
Network Security Threats Increasing
IT managers say mounting security risks combined with insufficient budgeting and staffing puts their organizations in danger, according to a netForensics study.
Twitter, Feds Settle Security Charges
Twitter must establish and maintain a "comprehensive information security program" and allow third-party review of the program biannually for the 10 years.
iPhone iOS 4 Security
Apple iPhone hit the streets today. I happened to be one of the lucky few who had his delivered by FedEx on Wednesday. So I had some time to kick around with it a bit, and took a look at its (lack) of new security features.
|