Security
2007.01.15 Daily Security Reading
by Rodney Campbell on Jan.15, 2007, under Security
Internet Security Trends for 2007
The year 2006 was extremely active for messaging security. Most notably, spam is back, driven by advanced image-based spam, which is 10 times more prevalent than text spam. And even though spam was in the forefront, viruses did not go away. 2006 showed a shift in virus writer’s tactics, and while the frequency and size of outbreaks decreased, the sophistication and maliciousness of these outbreaks increased. While the industry continued to fight spam and viruses, spyware, and malware also flourished in 2006, with two major tactical shifts during the year. The result? A busy year for internet security and predictions for an even busier 2007.
Security, privacy and DRM: My wishes for 2007
Scott Granneman (Security Focus) sets out his stall.
Decryption Keys For HD-DVD Found, Confirmed
If you had any doubts about the validity of BackupHDDVD – the time for doubts has come to an end today. Next stop: Blu-Ray.
2007.01.12 Daily Security Reading
by Rodney Campbell on Jan.12, 2007, under Security
Today’s spies exist in an age of constant information exchange, in which everyday citizens swap news, dial up satellite pictures of their houses and collaborate on distant Web sites with strangers. If the spies do not join the rest of the world, they risk growing to resemble the rigid, unchanging bureaucracy that they once confronted during the cold war.
High-Tech Handsets are Hacker Bait
Cyber crooks view new, smarter mobile devices as conduits to corporate networks.
The Ultimate Guide to Eliminating Spam Email
This in-depth guide to reducing the amount of spam you receive covers tools for both the novice and the power user: reputation filters, context analysis, DomainKeys, augmented addresses, and other tips and tricks to keep spam from ever reaching you.
2007.01.11 Daily Security Reading
by Rodney Campbell on Jan.11, 2007, under Security
According to GFI, a leading provider of network security, content security and messaging software, every IT manager should make it part of their New Year’s Resolution to protect their networks from the following threats in 2007.
The 60 Minute NSA Network Security Guide (pdf)
This Security Guide addresses security a bit differently. Instead of focusing on a single product or component it covers a wide range of network elements with the notion of providing a terse presentation of those most critical steps that should be taken to secure a network.
Make your own man-in-the-middle attack’ website found
So-called universal phishing kits allow users to configure their attacks to take advantage of any target website.
Scary Blogspam Automation Tools
Authors of this software package claim their product can evade a variety of technologies designed to defeat blogspam.
2007.01.10 Daily Security Reading
by Rodney Campbell on Jan.10, 2007, under Security
PHP apps – Security’s Low-Hanging Fruit
Common security mistakes by developers are giving PHP a bad name… PHP coding errors have become the new low-hanging fruit for attackers.
Daily Dave: Today’s patches – Microsoft January Bulletin
Wireless Forensics – Tapping the Air – Part Two
Technical challenges for wireless traffic analysis.
2007.01.09 Daily Security Reading
by Rodney Campbell on Jan.09, 2007, under Security
10 things you should know about privacy protection and IT
These days, IT bears a tremendous responsibility for safeguarding corporate data and protecting personal privacy information. This overview shows just how entrenched privacy concerns have become in the regular operations of the IT organization.
Hacking 2.0: Today’s Hackers Target Web, For Money
Web Security firm Finjan has just released their Q4 2006 report on web threats, which includes describing two cases of web 2.0 hacker attacks, on Wikipedia and MySpace. What’s more, the report says that hacking the Web is very much a commercial activity nowadays.