From the interesting reading department: Are your servers vulnerable to DNS attacks? More than half of Internet name servers today allow requests that leave networks vulnerable to cache poisoning and distributed denial of service attacks -- a fact that has not improved over the past year. NetworkWorld.com, 11/19/07. Spammers pose as private eyes to spread malware It looks like Veronica Mars and Magnum, PI are getting into the malware business. Commtouch, an Israeli security firm that specializes in protecting e-mail integrity, says that it has detected a new malware outbreak that is spread through e-mails claiming to be from private investigators. Network World, 11/19/07. 12 spam research projects that might make a difference Those who commit cybercrime know they need to stay on the cutting edge of technology to come up with new and different ways to swindle people. Luckily, the good guys are also spending time in research labs developing ways to thwart the latest tricks employed by spammers, phishers and other criminals. Network World, 11/20/07. Microsoft Fixes Gaffe in Time for Patch Tuesday For the second time in less than three weeks, Microsoft Corp. had to apologize for problems with a tool that many IT managers rely on to deploy the software vendor’s security patches and other software updates. Computerworld, 11/19/07. One tiny math mistake and the terrorists win? Hall of Fame cryptographer Adi Shamir, a professor at the Weizmann Institute of Science in Israel and the "S" in RSA, sounded the alarm about a potential problem with popular computing chips: namely that a math error unknown to the chip maker but discovered by a bad guy could lead to catastrophic consequences. Buzzblog, 11/17/07. Also: Microsoft confirms that XP contains random number generator bug Wetware Hacks Your hardware is well secured. You've got a good perimeter firewall in place that only allows communication on authorized ports, an IDS to scan for suspicious activity, WPA2 encryption set on wireless devices, and so on. Your software is secure as well. Patches up to date, good password policy enforcement, etc. So where is the weak point in your network? I think there's a common expression used to describe it -- the problem exists between keyboard and chair. Symantec Security Response blog, 11/22/07. A Look Back at the Security Trends of 2007 Here, in no particular order, are the top 10 Internet security trends of 2007. Symantec Security Response blog, 11/23/07. |
No comments:
Post a Comment