INFORMATION

Site Map - IT

A Site To See

- As the number of Internet-based threats grows, it becomes more and more difficult to assign a single name to malicious code. Spyware, malware, crimeware what word can be used to describe a whole galaxy of threats? A new Web site established by experts at several top universities and sponsored by high-tech companies like Google and Sun Microsystems offers a suggestion: badware. The site, stopbadware.org, was created by the Berkman Center for Internet & Society at Harvard University, the Oxford Internet Institute, and Consumer Reports WebWatch.The sheer size of the badware problem makes this site particularly timely and useful, and thus A Site to See this month.

Worth a Look: Traveling With Encryption

- Travelers looking to take sensitive documents with them on the road can burn that data to a CD while simultaneously encrypting it using a new product from Ricoh called EncryptEase. Then, they can decrypt those documents using any computer that has an attached CD writer, add to or alter the data, and then burn it back to the same CD while reencrypting it. The twist is, the encryption software and the space for burning the files are on the same disk. Where to get one. Balancing these reservations is the fact that the disks are cheap; they retail for $6.99 each at Ricohs Web site. Get there via "Beyond Print" links at SM Online.

Exterminating Online Pests

- Threats to your computer can range from gnatlike annoyances such as pop-up ads to the pointed hooks of pernicious phishers. PC Pest Patrol: Protect Your Computers from Malicious Internet Invaders, a new book from Preston Gralla, shows how to trap these invaders in a protective web that keeps your computer running smoothly and your personal information safe. The book is available at the O'Reilly Web site for $24.95. A sample chapter from the book is available via SM Online.

Cybercriminals Turn Pro

- Research from Symantec finds that computer hacking is becoming a full-time vocation.

Capitalist Crooks

- Security researchers see 2005 as the year in which cyberattackers turned from braggarts to capitalists.

Land of Phishing

- Websense, a provider of employee Internet management solutions, offers updates on phishing attacks.

Identity Theft Can Be Fun

- The Federal Trade Commission now offers an amusing online quiz about the basics of identity theft, spyware, phishing, and other scams. It also teaches users how to obtain a free credit report, use sufficient passwords, report identity theft, and otherwise protect themselves from identity thieves. @ The site, onguard online, also provides links for sending information on scams and attacks to government authorities. get there via SM Online

Quick Bytes: Proliferating Bots

- The growth of malicious Web robots, or bots, this year will likely surpass the 413 percent growth rate seen for rootkits last year, according to a Sana Security warning.

Quick Byes: Wireless holes

- Computer vulnerabilities are well documented by Web sites such as the one hosted by The Mitre Corporation known as Common Vulnerabilities and Exposures (CVE). Vulnerabilities in wireless systems, including 802.11 and Bluetooth, now are getting similar attention.

Quick Bytes: Lost message, lost time

- If you’ve ever wasted time searching for an e-mail you know you’ve sent or received but can’t locate, you’re not alone: 59 percent of all U.S. adults have done it (the number is 6 percent higher for those who make more than $75,000 a year).

NEW IN PLAINTEXT: Securing Windows XP

- More than seven out of 10 home computers run Windows XP, so locking down these computers is an essential task, because poorly protected home computers are often the source of attacks against corporate networks.

Worth a Look: Web Browsing Under Wraps

- Anonymizer Anonymous Surfing prevents Web sites from collecting data from your visits because it creates an encrypted tunnel between your computer and the Anonymizer network while you surf; then, any page you visit will see Anonymizer’s IP address, not yours. The software installs after a quick download and can be used with either Internet Explorer or Firefox browsers.

The Detective and the Database

- Combining investigative know-how and computing power can help security professionals find crime clues hidden in databases.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.