Found on silicon.com: “Security from A to Z”. Click on the links below to find out more… A is for Antivirus B is for Botnets C is for CMA D is for DDoS E is for Extradition F is for Federated identity G is for Google H is for Hackers
Tag: Security
The Dark Side of the Force…
The financial crisis will have negative aspects in all business. Security IT must be kept at the same level (even increased) but facts are there: budgets are frozen, etc… According to PricewaterhouseCoopers (PwC) analysts, there are risk to see jobless techies go to the “dark side of the force” and
ISSA Belgian Chapter Event: New ISSA event: Microsoft Windows Server 2008
Back from Microsoft Belgium where occurred an ISSA Belgian Chapter event about security of Microsoft Windows Server 2008. The speaker, Ronny Bjones, started with some historical facts about the Microsoft products and security. He explained why Microsoft had lot of security issues in the past, due to the way developers
Minimal Security
Credit: http://flickr.com/photos/fboyd/2494909325/.
Simple DLP with Ngrep
DLP stands for “Data Loss Prevention” or sometimes, “Data Leak Protection“. Companies primary goal is to make business. And their activities rely on their data (customers, databases, research results, statistics, source code, …). DLP is a security process which takes care of: monitoring, identify and protection of the data. The
And What About the “Zero-Knowledge” Risks?
A new 0-day exploit is in the wild for Internet Explorer 7 since yesterday. Of course, this is a big issue and countermeasures must be deployed as soon as possible. A lot of security solutions companies try to use the 0-day effect as a marketing element “Ã la Barack Obama”:
Password Protected .exe Files
This is not a bullet-proof solution but it can be helpful from time to time… Empathy is a small tool to protect your Windows executable files with a password. To run the program, a dialog box will ask you the password. It can prevent children or unauthorized person to start
Juniper ScreamOS
Graeme Neilson, a security consultant working for Auro Software make a presentation during the last Ruxcon conference about a trojan developed for the ScreenOS running on Netscreen firewalls: “The presentation covered Graeme’s research on how he’s developed a trojan ScreenOS operating system that when loaded onto any Juniper Firewall turns
Strange Spam via Google Docs
During the last 24 hours, I started to received a lot of spam messages based on Google Docs. The e-mails look like: From: <random address> To: <me> Subject: Monthly Payments Keep Rising. If you are one of the many homeowners whose payments are high and home values are low, or
ISACA Belux Chapter Meeting – Emerging Threats for 2009
This evening, I attended an ISACA Belux Chapter meeting about the following topic: “One year after: what really happened and what didn’t. What do you expect next year?” (Read the announce). In December 2007, our local chapter performed an exercise: (try to) define the upcoming security threat for 2008 (meeting