How to handle security

I’ve previously discussed how important it is to pay attention to the medium you’re using; transferring data via satellite for example puts you at great risk as you’re spreading your data on a wide geographical range, in most cases unencrypted. Everyone with a satellite tuner hooked up to his computer system can intercept any data being […]

Continue reading

Trust – The Enemy of Security?

Some time ago I was reading about the Counterfeit banknote detector pen.  This pen basically writes in yellow on genuine money but in black or grey on fake money. So I thought, great but doesn’t that mean that if a counterfeiter defeats the pen he will likely have an easier life laundering his fake money? […]

Continue reading

Protecting your assets using one word – The Password

In a world where a sizable part of any company’s assets or management thereof resides in a computer system, it is more than sensible to expect those systems to be as highly protected as possible. In most cases all the protection hinges on a number of words, one for each person accessing the system. Obviously […]

Continue reading

Hacking Devices – USB

USB has become a very popular interface over the years. Plenty of devices have been developed that provide a USB interface such as cameras,  phones, music players, the list is endless. While this is a useful technology, some of these devices have also brought with them new threats to our computer systems that need to […]

Continue reading

Protecting Your Passwords and Confidential Information

Protecting Your Passwords and Confidential information We all know how important a password can be. This is especially true when that password is used on multiple systems. In my past articles I have talked about how to protect one’s passwords from compromised machines that could have Trojans installed on them. There are however many more […]

Continue reading

Hacking Devices – Ensuring your printer is secure

After talking about mobile phones as a threat to your organization we will today discuss yet another device widely in use and that too has the potential of being misused in a way that can compromise your organization. This device is generally seen as an innocent tool and few would consider any security implications that […]

Continue reading

Hacking Devices – How to protect yourself from data theft

Some time ago I wrote an article about preventing virtual theft – theft of goods from a virtual world (such as a game) by compromising the machine from which you play the game – and loyal reader John Mello pointed out how it’s not only gamers who have to worry about virtual theft but also […]

Continue reading

How to prevent Virtual Theft

We have talked a lot about theft in the real world so I guess it is about time we also discuss theft in virtual world. The BBC reported that some Trojan software are now targeting Online Games and stealing login information from their victims. Microsoft have stated that Taterf (one such Trojan) was reported to have […]

Continue reading

Search Engines, Friend or Foe?

Security is all about identifying threats and provisioning for them before your enemy exploits that threat. There are so many vectors to take care of that it truly is a daunting task. Input validation, perimeter control, user education, cryptography, physical security, access control; the list goes on and on. Each of these needs its own […]

Continue reading

Protecting against Money Theft

Time and time again we read stories about malicious people using Trojans to steal money. This time it happened to Cumberland County Redevelopment Authority where, by using a Trojan, a malicious hacker stole nearly half a million dollars.  Brian Krebs from the Washington post has some really good tips and detailed coverage of this story. […]

Continue reading