Monthly Archives: May 2006

Single Sign-On Raise Concern Amongst Security Experts

Over 60 percent of companies that have implemented enterprise single sign-on (ESSO) technology have seen a reduction in calls to the IT helpdesk according to independent research carried out by Winmark and launched today by RSA Security, the expert in protecting online identities and digital assets.

Users Versus Hackers: Which Are Worse?

It’s 5 p.m. on a Friday, and you’re the lead security engineer for the headquarters site of a major corporation. Just as you’re getting ready to ease out the door for the weekend, the phone rings and there’s a frantic voice on the other end of the line.

Password Hashing

In this article I´m going to cover password hashing, a subject which is often poorly understood by newer developers. Recently I´ve been asked to look at several web applications which all had the same security issue – user profiles stored in a database with plain text passwords.

Does Installing SSH Enable More Exploits Than it Solves?

Some years ago I started doing research on SSH, the wonder tool of the security set. I read one article about a clever SSH setup. The administrator’s DMZ hosts could contact the intranet patching server, something normally verboten.

Many wi-fi spots vulnerable to hackers

Computer security specialist Cory Michal needs only five minutes, using store-bought technology, to access credit card information from a downtown Milwaukee restaurant. Michal, who is co-founder of Exceed Security Systems, an Appleton company with a Milwaukee office, used about $1,000 worth of gear to tap into financial data transmitted over wi-fi systems.

State of Technology: Beating Back Hackers

At one point, Jeanson James Ancheta, a 21-year-old California hacker, had more than 400,000 compromised computers at his command. He and his ´botmaster underground´ cohorts would sell access to their ´botnet´ to third parties, which would use it to launch massive distributed denial-of-service attacks, disseminate a torrent of spam and install adware on unsuspecting users´… Read More »

Rootkits -The new wave of invisible malware is here

Lately there has been a lot of discussion about rootkits and the type of threats they present. This article aims to provide a basic explanation of rootkits and how this low level technology can be used by malware developers to infiltrate computers in a way that is very difficult to detect and remove.

MicroWorld Futuristic Network Firewall

The developers of the world’s most advanced AntiVirus and Content Security Solutions, MicroWorld Technologies, launches its futuristic, enterprise class firewall eConceal, today, on 26th of May, 2006. The release has been increasingly attracting great fanfare and enthusiasm from its global client base, media and well-wishers.

Vista Security Advancements

Windows Vista is the first version of the Windows client to be developed using Microsoft’s Security Development Lifecycle, which makes security a top priority from the start by defining a repeatable engineering process that every developer must follow, and then verifying that process before release.