Wednesday , 24 April 2024
Home 4 Security (page 3)

Security

WPA Wi-Fi Encryption Cracked

SECURITY researcher says they’ve developed a way to partially crock the Wi-Fi Protected Access (WPA) encryption standard that is used to safeguard data on many wireless networks. Erik Tews was demonstrate the attack at the PacSec conference in Tokyo in mid November, cracking WPA encryption could be exploited to read data being sent from a …

Read More »

Thwarting Identity Theft

Identify theft has been a federal offense since 1998, but are we getting any better at dealing with it? Actually, the number of identity theft victims per years nearly 2 million from 2003 to 2007 (10.1 million to 8.4 million), according to a javelin strategy & research survey, as reported by the privacy rights, clearing house and the mean time required to undo the damage in each instance was down from 40 hours in 2006 to 25 in 2007. Most of the financial losses in an identity theft are suffered by credit issuers and banks, as victims are rarely held responsible for fraudulent debts incurred in their name, but victims often bear the responsibility of contracting their banks and credit issuers after an identity theft has occurred. Even these declining numbers are fairly high, however and learning that your credit card has been used by a stranger can chill your …

Read More »

What Color is a Security Hole?

Computer attacks is space are no longer the stuff of science fiction, recently, laptops on international space station on the international space turned out to have computer viruses, NASA Believes that the malware a pass word stealer that the targets online games, may have infected the laptops via USB thumb drive that one of the astronauts carried aboard, while it wasn’t much of a threat, it just goes to s how the little buggers are everywhere. One flaw in the largely forgotten windows image color management (ICM) system allows a villain to take over your pc if you view a tainted image displayed on a web page or embedded in office document or email. This is one of 19 holes for which Microsoft issued six critical patches; attackers could use them for their malicious creations (no booster rocket required). Though ICM (meant to ensure that colors display correctly on different …

Read More »

Build Your Own Free security suite

Do it all suite are the name of the security game these days, sure you can gather free programs that cover the bases much as a suite would, but who wants to bother with finding out which apps work together and which one might leave you pulling your hair out. Your Anti Virus Base For free collection with AVG free 8.0, it installs easily and it works under XP and vista, it ads for its paid version don’t get in the way, and since it ferrets out spyware and adware, you don’t need to install a separate antispyware program, also it generally does well in signature based detection test from organizations such as AV-Test.org (those test typical evaluate the paid product, but the free and paid version use the same signature base scanner. AVG Free does have the same limitations, though the app will detect and block rootkits, stealth technology …

Read More »

How secure is your banking site

More than 75 percent of banking sites are not secure, according to a study out of the University of Michigan. A new study from the University of Michigan has found that more than 75 percent of banking websites are not completely up to snuff when it comes to security. The study looked at 214 financial institution websites and focused on both design flaws and improper security practices. None of these flaws represent catastrophic security issues, but many could allow for easier access to your password and user name should a malicious hacker come calling. The flaws studied included the following: Insecure Login System Nearly half of the banks examined had “secure” login systems on insecure web pages which did not use the SSL protocol. Failure to use SSL, the study says, allows for the possibility of an attack that would allow for the interception of login details if a user …

Read More »

New Worm Transcodes MP3s to Try to Infect PCs

A new kind of malicious software could pose a danger to Windows users who download music files on peer-to-peer networks. The new malware inserts links to dangerous Web pages within ASF (Advanced Systems Format) media files. “The possibility of this has been known for a little while but this is the first time we’ve seen it done,” said David Emm, senior technology consultant for security vendor Kaspersky Lab. Advanced Systems Format is a Microsoft-defined container format for audio and video streams that can also hold arbitrary content such as images or links to Web resources. If a user plays an infected music file, it will launch Internet Explorer and load a malicious Web page which asks the user to download a codec, a well-known trick to get someone to download malware. The actual download is not a codec but a Trojan horse, which installs a proxy program on the PC, …

Read More »

Keep the kids safe online

Kids use computer for everything these days, homework, games, chatting with friends. The computer is an invaluable tool but like any tools, can misused, parental control utilities let parents apply appropriate limit and event monitor exactly what kids are doing on the computer. Most parental control utilities block kids from accidentally or deliberately accessing internet site in age inappropriate categories sex and violence, for example. To be effective this feature must work at the protocol level, independent of which browser is used. Most such programs also control just when the kids can use the computer, the internet or both, the product must resist tempering, such as by kids finding ways to tweak the system clock. Many of these utilities also offer to block or control use of instant messaging, though a clever teen will probably find ways to chat regardless.

Read More »

Server Security Information

For any operating system, it is important to follow server security information the general guidelines. The actual details used to implement these guidelines may vary slightly, but the ideas are the same regardless of the operating system. If followed, these will go a long way toward securing a computer. A server is any computer which processes requests for data or services from another networked computer. These services include, but are not limited to, HTML, print sharing, file sharing, database, application serving and so forth. Workstation operating systems such as NT or Unix/Linux can be configured in such a way as to act as a server. Physical Security All servers must be secured at all times to prevent theft and loss of critical data. They must be protected behind rooms that require access using biometrics or card swipe device. Room keys may be temporary used until one of the approved methods …

Read More »

Can you trust your social network

I’m sure some of you already been familiar with MySpace.com, hi5.com, bebo.com, facebook.com, bolt.com, friendster.com and so on. But as time passes by you require features and security that doesn’t come up with the above mentioned sites. I’ve been to all of the above mentioned sites, well they are not able to meet my requirements. Looking for flexibility, security, storage, blogging, streaming, customization and distribution options. Then i went to multiply. Day by day i study it. They have some unique feature that really impressed me on far extent while others can’t even go near to it. Multiply is social network with a great combination of security and distribution measures. Multiply has an Ajax/web 2.0 based interface which is another unique thing you can’t just forget off.

Read More »