DLP stands for “Data Loss Prevention” or sometimes, “Data Leak Protection“. Companies primary goal is to make business. And their activities rely on their data (customers, databases, research results, statistics, source code, …). DLP is a security process which takes care of: monitoring, identify and protection of the data. The
2008 Top-Ten Strange Data Recoveries
Kroll onTrack is a well-know company which performs data recovery. Once a year, they publish the top-ten of strange cases they faced during the last twelve months. “Strange”… is the right word! ;-) Check out the 2008 chart: Kroll Ontrack Top Ten Data Mishaps and Recoveries. My favorite is the
And What About the “Zero-Knowledge” Risks?
A new 0-day exploit is in the wild for Internet Explorer 7 since yesterday. Of course, this is a big issue and countermeasures must be deployed as soon as possible. A lot of security solutions companies try to use the 0-day effect as a marketing element “Ã la Barack Obama”:
Password Protected .exe Files
This is not a bullet-proof solution but it can be helpful from time to time… Empathy is a small tool to protect your Windows executable files with a password. To run the program, a dialog box will ask you the password. It can prevent children or unauthorized person to start
Juniper ScreamOS
Graeme Neilson, a security consultant working for Auro Software make a presentation during the last Ruxcon conference about a trojan developed for the ScreenOS running on Netscreen firewalls: “The presentation covered Graeme’s research on how he’s developed a trojan ScreenOS operating system that when loaded onto any Juniper Firewall turns
Strange Spam via Google Docs
During the last 24 hours, I started to received a lot of spam messages based on Google Docs. The e-mails look like: From: <random address> To: <me> Subject: Monthly Payments Keep Rising. If you are one of the many homeowners whose payments are high and home values are low, or
ISACA Belux Chapter Meeting – Emerging Threats for 2009
This evening, I attended an ISACA Belux Chapter meeting about the following topic: “One year after: what really happened and what didn’t. What do you expect next year?” (Read the announce). In December 2007, our local chapter performed an exercise: (try to) define the upcoming security threat for 2008 (meeting
Laptop Face Recognition Vulnerability
This following issue has been reported by Bkis: Vulnerability in Face Recognition Authentication Mechanism of Lenovo-Asus-Toshiba Laptops. Modern laptops have often a small built in camera on top of the screen. Some vendors developed software’s to perform face recognition authentication. Theoretically, the principle is very attractive: the computer recognizes the
Enjoy Your Christmas Holiday
Christmas is close to us! It means a break for a lot of [net|sys]admins, business will slow down… Things break where no one is around (that’s the Murphy’s law). So be prepared and enjoy your EOY period! Make sure… Your backup procedures are up-to-date and operational (enough tapes?); Your file
“The” Drink for IT People!
Available here.