What's up IT? > Archive
How to Improve on Wireless Security
Elmer Fudd has been trying to keep that ''wascally wabbit'' Bugs Bunny out of his carrot patch since before Remington Rand built the first UNIVAC. But, when you start talking about how to keep those wascally hackers out of your wi-fi network, you'll soon find yourself sounding like Mr. Fudd himself.
Thursday, 12 January 2006 09:51 EST
WLANs Enter Integration Age
Activate a wireless LAN and here's a small sample of the potential fun that awaits you: de-authorization message floods, denial-of-service attacks, and rogue access points (APs).
Thursday, 12 January 2006 09:45 EST
Homeland Security helps secure open-source code
The U.S. Department of Homeland Security is extending the scope of its protection to open-source software.
Wednesday, 11 January 2006 13:40 EST
Qualys vulnerability research put in peril
Security management vendor Qualys has denied that its innovative Laws of Vulnerability research has been jeopardised by the sudden departure of its key instigator, Gerhard Eschelbeck.
Wednesday, 11 January 2006 13:39 EST
Microsoft Plugs 'Critical' E-Mail Server Holes
Microsoft Corp. on Tuesday released two security bulletins to fix "critical" flaws in several widely deployed products, including one that presents a remote unauthenticated attack vector that could leave corporate e-mail servers open to a destructive network worm attack.
Wednesday, 11 January 2006 13:38 EST
Phishing By The Numbers: 41,000 Blocked Sites in 2005
The Netcraft Toolbar has blocked more than 41,000 confirmed phishing URLs since its launch last Dec. 28. The volume of URLs increased throughout the year, from about 3,000 per month in June to 5,000-plus in September and more than 8,000 in October and November. With a year's worth of data in hand, an analysis of attacks illustrates common patterns and practices in the operation of phishing scams.
Tuesday, 3 January 2006 11:19 EST
Top 7 PHP Security Blunders
PHP is a terrific language for the rapid development of dynamic Websites. It also has many features that are friendly to beginning programmers, such as the fact that it doesn't require variable declarations. However, many of these features can lead a programmer inadvertently to allow security holes to creep into a Web application. The popular security mailing lists teem with notes of flaws identified in PHP applications, but PHP can be as secure as any other language once you understand the basic types of flaws PHP applications tend to exhibit.
Friday, 23 December 2005 09:29 EST
The human factor and information security
This article has not been written in order to scare users, or to push them into buying security software for their computers. It's simply an attempt to share some thoughts which have come to mind in my work as a virus analyst, while analysing code, reading a range of forums and articles, and numerous daily messages from readers asking for help.
Friday, 23 December 2005 09:28 EST
Why I Love Vulnerability Analysis In 2005
Walk into the data center with my escort. Look at appliance. "No, you can't have a login to the box". "No, you can't generate any packets and look at the responses; these are hooked up to production servers". I've got professional liability insurance, but it's probably best not to exercise it. Mope briefly.
Friday, 23 December 2005 09:27 EST
IT security fear factor: Tape backups
In the television show "Fear Factor," people do foolish things for money. While the stunts are ultimately harmless, one may question whether eating worms or sticking one's head in lard for a cash reward is worth it.
Friday, 23 December 2005 09:24 EST
Next