Here's my latest stuff:Metasploit 3.1 updates improve Windows penetration testing Making the Business Case for Information Security[This is an interactive issue of the magazine. You'll need to click on Current Issue, then Contents, then the Contents graphic. You'll see my article listed. Click on it to go to it.]...and a related article:The Business Case for Information Security - What businesses are up against and why it is neededFinally, a podcast:Mobile ...
Continue Reading...Researchers at Princeton University have found a way around whole disk encryption. Dubbed the "cold-boot attack", apparently there's a way to "freeze" the whole disk encryption passphrase while it's stored in dynamic memory and then extract it using some software they've written. Having learned and applied what can be done with/to a PC at the chip level in my assembly language programming days, this comes as no shocker. Wish it ...
Continue Reading...Apparently more people are being accosted and having their laptops and other mobile devices searched and even taken away from them putting everything on the system at risk. Something drive encryption isn't going to fix! OK, maybe if you have everything stored on an encrypted file/partition. As inconvenient as it is, I'm starting to like the idea of having a clean laptop and only accessing files remotely. I'm just not ...
Continue Reading...Check out this news of Best Buy losing a laptop and, in turn, being sued for $54 million. Apparently there's sensitive information on it...Whew - steep price to pay for a laptop that just needed a new power button. Stakes will probably get higher once the number of people losing sensitive information is disclosed though. Maybe we'll see it on privacyrights.org's list of the finest. $54 million does seem a ...
Continue Reading...They're cheap and easy to use but lots of people don't think about them until it's too late. I'm talking about laptop locks like what the folks at office/computer stores and the folks at PC Guardian sell: They're not 100% foolproof -nothing in security is. But they add an excellent layer of defense in public places, hotel rooms, your own office, and even the trunk of your car beyond what ...
Continue Reading...Here's a not-so-innovative piece from one of the prominent wireless gurus, Lisa Phifer, on hotspot security but it's a good reminder of what to do nonetheless: http://www.wi-fiplanet.com/tutorials/article.php/3720151...
Continue Reading...Here are my recent information security articles you may be interested in. For all of my past content be sure to check out www.principlelogic.com/resources.html. How to get developers to buy into software security Cheap Microsoft licenses for security pros: the Microsoft Action Pack Mobile security: Setting responsible goals Mobile security: Top oversights You may need to perform a quick third-party registration to access some of them. Enjoy!...
Continue Reading...So, the latest in the lost laptop world is that 800,000 job applicants of Gap, Inc. now have their personal information exposed. Apparently the laptop was stolen from the office of an "experience third-party vendor". Experienced in what? Not taking security seriously? Apparently the contractor wasn't using encryption which was in violation of an agreement it had with Gap, Inc. You mean contracts aren't enough to protect information? Go figure.Gee ...
Continue Reading...After reading this piece about the recently released report on the TJX breach from the Office of the Privacy Commissioner of Canada and the office of the Information and Privacy Commissioner of Alberta, I had a thought about the false sense of security that wireless encryption gives us. TJX was apparently using both WPA and WEP for wireless encyrption but it was the WEP that got them into trouble. The ...
Continue Reading...