Cold-boot attacks change the data leakage landscape Until 2008, the consensus had been that there would be no practical way to remove a RAM chip from a computer system without losing all contained data. However, last July, researchers published a paper about something quite amazing: most RAM chips maintain their data for several seconds without any power, thus allowing a channel for data leakage from any computer to which an attacker has physical access. Two-factor credit-card safety for online transactions My friend and colleague Jurgen Pabel was one of our first graduates from the Norwich University Master of Science in Information Assurance. He is an active participant in our alumni discussion group and a frequent and welcome correspondent. Here, I present his latest suggestions (entirely his with minor edits and additions). Icy encryption tool protects laptops from "cold boot" attack, vendor says The vendor HyBlue says it can prevent the "cold boot" encryption hack discovered by Princeton researchers. 'Cold Boot' encryption hack unlikely, says Microsoft Users can keep thieves from stealing encrypted data by changing some settings in Windows, a Microsoft product manager said as he downplayed the threat posed by new research that shows how attackers can inspect a "ghost ... Cold Boot Attack put to test After researchers at Princeton University showed how they could dig up the contents of a computer's memory just minutes after the machine had been turned off using a "Cold Boot", it was only a matter of time before hackers began testing the technique. Cold bits as a security bypass Columnist Scott Bradner discusses how worried you should really be about a new disk-encryption bypass exposed by Princeton security researchers. Rogue SharePoint sites pose security menace Gartner estimates that 30% of SharePoint servers are rogue deployments, launched by business managers without the IT department's knowledge. Podcast: Lessons Learned 10 Years After Melissa Virus The virus named after an exotic dancer on March 26, 1999, helped kick off a bunch of high-profile threats that changed the security and IT world rapidly. On the eve of the 10th anniversary of the virus, Keith Shaw talks with Symantec's Kevin Haley about lessons that security vendors, IT and end users have learned about viruses and worms over the past decade. (8:13) Compass Award Winners: Security Leadership In Trying Times These are trying times. To say budgets are tight would be a severe understatement when, in fact, many businesses are struggling simply to survive in this economy. Current conditions make it even harder for security, which in so many companies is still seen as an unfortunate expense mandated by government regulations. Compass Awards: Robert Rodriguez Cancilla: Security Must Put Business First Pethia: InfoSec's Challenges, Changes Fleury: Insider Threat is the 'Weakest Link' Enter for a Microsoft training giveaway from New Horizons New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31. Network World on Twitter Get our tweets and stay plugged in to networking news. |
No comments:
Post a Comment