Secure Applications – Part Deux

According to a study done by the Computer Security Institute and the FBI, 97% of interviewed companies and administrations were using antivirus 98% have a network firewall Yet, 15% have reported suffering from network intrusions Almost every business and government is going to have ports 80/443 through their firewall, so that is where the bad guys are…

0

Defense-in-Depth vs. BitUnlocker: How to defeat Cold DRAM attacks using BitLocker, Power Options, and Physical Security

Princeton University published a paper this week entitled: Lest We Remember: Cold Boot Attacks on Encryption Keys which shows how an attacker can extract the contents of DRAM from a computer that is powered off and retrieve the encryption keys from memory offline and decrypt disks that were encrypted by many popular disk encryption software…

6

Home Router Hacks, VOIP Phishing & Driveby Pharming

A new era is dawning in mainstream hacking techniques that target devices that are not very well defended in most homes:  The routers that you get at your local retailer to protect your high-speed DSL or Cable connected PC from malevolent hackers is now the very platform that malefactors are using to steal your information,…

0