Entries by fdesir

Pentagon OKs Androids, BlackBerrys for soldiers

A posting from Naked Security about the Pentagon OKs Androids, BlackBerrys for soldiers: The US Department of Defense (DoD) announced on Thursday that it has approved the use of Samsung phones running a hardened version of Android. According to the BBC, the approval for other types of smartphones and mobile devices for use by US soldiers is […]

5 Ways For SMBs To Boost Security But Not Costs

A posting from Dark reading: For many businesses, improving their security seems like the proverbial money pit: but it doesn’t have to be that way. While the time crunch of attending to the demands of the daily business has typically created an accumulation of security problems for many businesses, information technology professionals at SMBs can improve […]

Sweet Password Security Strategy: Honeywords

A posting from Information Week in there security section: Businesses should seed their password databases with fake passwords and then monitor all login attempts for use of those credentials to detect if hackers have stolen stored user information. That’s the thinking behind the “honeywords” concept first proposed this month in “Honeywords: Making Password-Cracking Detectable,” a paper written by Ari Juels, chief scientist […]

IBM takes a big new step in cryptography: practical homomorphic encryption

A posting from Naked Security  about IBM takes a big new step in cryptography: practical homomorphic encryption: IBM just released an open source software package called HELib. The HE stands for homomorphic encryption. Although it doesn’t sound terribly sexy or impressive, HELib is actually an interesting and important milestone in cryptography. HE is also a surprisingly relevant topic right now, with […]

Got Malware? Three Signs Revealed In DNS Traffic

A posting from Dark Reading about Malware and three Signs Revealed In DNS Traffic:  Companies focus much of their energy on hardening computer systems against threats and stopping attempts to breach their systems’ security, and rightfully so. However, companies should always assume that the attackers have already successfully compromised systems and look for the telltale signs […]

See how beautiful a DDoS attack can look

A posting From Cnet News in there security and privacy section: Using the Web app Logstalgia, a developer has managed to capture on video a visual impression of what happens during a DDoS attack. We’ve all heard of a distributed denial of service (DDoS) attack and know what it is: when a person or people attempt to take […]