According to a study released by WebSense, 25% (!) of conducted security professionals would agree on jail sentences for CEO’s who did not respect the “due care” principle. Read the press release here for all results.
Airport Security
(c) J.D. Frazer
Plaintext Passwords Are Bad!
(Click to enlarge)
openpacket.org – Network Traffic Trace Repository
A new free service is available to analysts, network administrators, students or any other people involved in security: openpacket.org. The goal of this new service is to provide network traces for further analyze. This can be very useful to analyze how work well-known worms or any other kind of attack.
Symantec ThreatCon Level 2
Symantec raised the Threatcon Level to two. The reason? They detected in-the-wild exploit attempts targeting a GDI vulnerability patched by Microsoft on April 8, 2008. The malicious image appears to target the Microsoft Windows GDI Stack Overflow Vulnerability (MS08-021). More info about Symantec DeepSight Threat Management here.
Hubble Monitors the Internet
Addicted to security, my preference goes to monitoring of infrastructures, reporting and incidents handling. Today, networks are a business critical element in companies whatever, their business and size. I like this citation: “There are three kinds of death in this world. There’s heart death, there’s brain death, and there’s being
LinkedIn Relays Spam?
I’m not addicted to social networks. I only use LinkedIn. It helps you to keep your business network up-to-date more easily. Maintaining your social networks in too much time consuming (no idea about yours, but my days should have 48 hours at least!) and I don’t like to spread personal
Your Value is $15
Symantec published its new Global Internet Security Threat Report Volume XIII. Inside the document, you can find some interesting information about the “market” of stolen data. Do you know what’s your full identify value? Your password or CC?
Just Type And I’ll Tell You Who You Are!
User authentication or “who is behind the keyboard” is one member of the “triple-A” or “AAA” trilogy in security: Authentication : Who are you? Authorization : Are you allowed here? Accounting : From where, how and when did you come here? Regarding the authentication, there are a lot of methods/technologies
Suspicious MSN Activity?
Today, I received a strange message from a friend on MSN. Just a link: http://xxxxx.0a8qmz.info where xxxxx was my friend’s name. Just the URL, nothing else. It was not a normal behaviour for him! For security (we never know what can happen), I started a new browser in a VM