Microsoft (via the Solutions Acceleratos team) published an interesting document about NAP: “ Selecting the Right NAP Architecture“.
Category: Security
(IN)SECURE Magazine #17
(IN)SECURE Magazine issue 17 (July 2008) is out! Open redirect vulnerabilities: definition and prevention The future of security is information-centric Securing the enterprise data flow against advanced attacks Bypassing and enhancing live behavioral protection Security flaws identification and technical risk analysis through threat modeling Migration from e-mail to web borne
New SANS Papers
The SANS Institute released two interesting new papers: Host Intrusion Prevention Systems and Beyond Security Policy for the use of handheld devices in corporate environments
Microsoft, HP ship free tools to protect Web sites from hackers
Microsoft and HP released free tools to help web developers to protect their sites against SQL injection attacks. Source: http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9103138&intsrc=hm_list.
Fired Due to a Malware!
The following story has been relayed by several blogs and newspapers. An employee was fired for violation of its company computer usage policy: Child porn was found on his laptop. The first human reaction facing such evidences is not always the best one: “Guilty!”. A computer forensics analyst spent one
Lynis: Security and System Auditing Tool
Michael Boelen announced today a new release of his tool called Lynis dedicated to UNIX specialists. Michael is also the developer of RootKit Hunter. Quote from the homepage: “Lynis is an auditing tool for Unix (specialists). It scans the system and available software, to detect security issues. Beside security related
Upside-Down-Ternet
Security is part of our daily life and is a serious topic. So, when it can be made with some fun, it’s even better! 😉 Check out: Upside-Down Ternet.
Shit Happens!
We are all vulnerable! Yesterday, it was my turn… Infected by a trojan. Up to 04:00 AM to fix the problem! The culprit was Vundo. A well-known (and quite old) Trojan which slows down the system, display pop-ups etc… Nothing very malicious but it was difficult to get rid of
The Data Retention Effect on Citizens Behavior
In Germany, data retention is already in place for communication channels such phone calls, Internet access and e-mails. A recent survey (German document) demonstrated that German citizens are aware about the way there private data are logged and changed their behavior in this way. Read comments about this survey here.
Who’s the Weakness?
The Canadian Minister of Foreign Affaires, Maxime Bernier was forced to resign due to a scandal in his country: Sensitive information were disclosed. The problem was the Minister himself! He forgot documents classified “secret defense” in his girlfriend apartment. This is a big mistake but, unluckily for him, his girlfriend