INFORMATION

Site Map - IT

Hacking Wireless Networks for Dummies

-

Numbers

- E-mail messages from the fourth quarter of 2005 believed to be spam

Worth a Look: Portable Data Safes

- Software that’s built into the drive provides encryption, an e-wallet function for storing credit card numbers, and single sign-on to applications and Web sites. Data is encrypted using 256-bit AES encryption. A 4-to-40-character password is optional.

Old E-Mail Worms Never Die

- Security and outsourcing, cell-phone risk, e-mail worms, and what’s new in secure portable data devices.

Looking for Secure Outsource Partners

- Security and outsourcing, cell-phone risk, e-mail worms, and what’s new in secure portable data devices.

Has Cybercrime Surpassed Physical Crime?

- Cybercrime versus physical crime, antiterror advice, cargo security, and rail security.

A Site to See

- Unlike the bricks-and-mortar world, where you can lower your risk of becoming a victim of crime by staying out of dangerous neighborhoods, digital threats are fairly equally dispersed. Crimeware can—and probably does—arrive several times a day into your e-mail’s inbox, and an unpatched computer can pick up a “drive-by” infection simply by visiting an infected site. If you want to learn more about online fraud and crimeware, visit a new Web site from Symantec that offers detailed explanations of well-known as well as nascent threats. It also includes prevention tips and advice about what to do if you are victimized. There are even some demonstrations of phishing, pharming, and Trojan horses, as well as some quizzes that will let you test your knowledge of the online threatscape. The rich resources and explanations make it A Site to See.

IT Security

- A new report from the IT Governance Institute finds that IT security should be handled at the top level.

Computer Vulnerabilities

- Connecting an unsecured computer to the Internet could be disastrous, according to a study by network-security provider StillSecure.

A Chip Off the Privacy Block?

- RFID tags are becoming increasingly popular, and a debate is underway over the privacy implications of this technology. Editor's Note: The discussion of a DHS report on RFID in the section entitled "Homeland Security" includes a correction from the print edition. The error was introduced by the editor, not the author.

The Software Vulnerability Guide

- The Software Vulnerability Guide was written to help software developers acquire the methods necessary to write secure code and find existing problems in current software.

Black Hat Physical Device Security: Exploiting Hardware and Software

- One Web-based video camera system described in the book was released with a flaw that would allow a misspelled Web address to bypass all authentication mechanisms in the system, granting the user full administrative access to the devices.

Nostalgic for the Days of “My Doom”

- Under Symantec’s system, malicious code is ranked from one to five; the higher numbers—what Turner calls “bell-ringing alarm threats”—represent the threats that cause much immediate damage and are difficult to contain because they are widely distributed. “We’ve only seen six category-three worms in 2005,” Turner says, referring to the most recent statistics compiled in the report, “whereas in 2004 we saw 32.”
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.