INFORMATION

Site Map - IT Security

New in Plaintext

- The text, CEH Official Certified Ethical Hacker Review Guide, is reviewed.

Site to See

- The software has a simple interface and uses highly regarded Twofish encryption. Keep your passwords organized and secure at this month’s A Site to See.

IT Pros Wary of Google Desktop

- Are the reported flaws truly serious, or is the hype mainly about knocking the wildly successful Google down a peg?

Voice Biometrics Get Heard

- A push for two-factor authentication is making voice recognition a more attractive security option for financial firms.

A Site to See

- The wireless protocol named Bluetooth is enjoying growing popularity in part due to regulations around the world that require drivers to use hands-free headsets when they’re on the phone. Automobile manufacturers have begun building these units into new models, and do-it-yourself kits abound; but unfortunately, they’re not always configured securely.

Quick Bytes: New from NIST

- The National Institute of Standards and Technology (NIST) has released a half-dozen draft reports on issues such as patch and vulnerability management, preventing and handling malware incidents, and applying forensic techniques to computer and network data analysis.

A Site to See

- The wireless protocol named Bluetooth is enjoying growing popularity in part due to regulations around the world that require drivers to use hands-free headsets when they’re on the phone. Automobile manufacturers have begun building these units into new models, and do-it-yourself kits abound; but unfortunately, they’re not always configured securely. The result? The Car Whisperer, an auditing tool from security researchers at the Trifinite Group, which includes several noted Bluetooth researchers. The Car Whisperer tool makes it possible to “inject audio data” into a poorly configured Bluetooth device and also to eavesdrop on conversations held inside the car. @ The group’s blog contains this and many other tools designed to compromise poorly protected Bluetooth systems. The Trifinite associates are passionate about spreading the word on Bluetooth security, making it A Site to See.

VoIP Risk

- The FDIC has issued a report that examines security risks associated with voice over IP (VoIP).

Technology Analysis

- NIST has published several reports on computer and network analysis, mobile devices and IT products.

Congress Looks Into Electrical Grid Security

- Lawmakers fear the nation's electric infrastructure is vulnerable to a devastating cyberattack.

Spyware

- A bill (H.R. 964) introduced by Rep. Edolphus Towns (D-NY) that would make the use of spyware illegal in certain circumstances has been approved by the House of Representatives and has been referred to the Senate Commerce, Science, and Transportation Committee.

Cybercrime Could Imperil Electoral Process

- Researchers says internet scams are a threat to future elections.

Malware Rising

- A new report forecasts that there will be strong growth in the anti-malware business over the next several years. A main driver is the increasing organization and skill of cybercriminals.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.