Infosec Island Security News Digest for 8-23-2010

Monday, August 23, 2010

Infosec Island Admin

7fef78c47060974e0b8392e305f0daf0

Bootable USBs for Consumer Security The major problem facing online banking today is really the consumer system. Home PCs are so compromised or infected that they represent a significant issue for the banking process. Home systems can pretty easily be removed from the equation with a simple bootable LiveCD or USB key…

Spies Among Us The term spy conjures ideas about foreign operatives, moles and James Bond. You might envision forged IDs, fake passports and fraudulently issued government sponsored papers. The eleven Russian spies recently nabbed used the same equipment that you and I use today, including laptops, flash memory ca…

Business Associates Liable for Breach Proposed modifications include changes required by the HITECH Act and others deemed appropriate by OCR in order to strengthen the privacy and security of health information and to improve the workability and effectiveness of the Privacy Rule, Security Rule and Enforcement Rule…

New SIEM Whitepaper on Use Cases In-Depth Comprehensive firewall log collection is mandatory for this use case, and it is important to remember that firewalls can record both failed and successful connections through the firewall – both types are essential for SIEM…

Are We Really Still Doing This in 2010? The thing that bothered me was that the links were redirected from a 3rd party marketing site. So now you have users who receive an email from their bank that has links in it that go to a different site than the link shows. Sounds an awful lot like what the phishers do…

Intel Announces Intent to Acquire McAfee At $7.68 billion this is the biggest acquisition of a pure play security company ever. It is also the worst. There is no synergy, no channel benefits, marginal revenue enhancement (considering the price), no new markets, and no meaningful strategy…

Cyber Warfare and the Conflict in Iraq This paper recognizes some denied and approved cyber attacks that have been used in Iraq, identifies the major causes of the United States’ apprehension about using cyber warfare, and analyzes how the United States can streamline future use of cyber warfare…

Bullet Proof Hosting: Threats and Opportunities Spammers, hackers, and other fraudsters utilizing the Internet to perpetrate criminal activity will continue to support hosts who can guarantee client anonymity, and could lead to an increase in the number of BPHs and advances in methods of service delivery…

Dr. InfoSec’s Quotes of the Week (007) Who said: “If I look at enough of your messaging and your location, and use Artificial Intelligence, we can predict where you are going to go. Show us 14 photos of yourself and we can identify who you are. You think you don’t have 14 photos of yourself on the Internet? You’ve got Facebook photos……

Are Contactless Payment Methods Secure? Hackers, whether they’re black hat (bad guys) or white hat (security professionals), are always looking for vulnerabilities in technology. The bad guys’ intentions are to exploit these vulnerabilities for ill-gotten gain, and the security professionals’ are to make the technology more secure…..

InfosecIsland.com is a vendor-neutral professional community committed to serving the needs of SMBs and mid-market enterprises, and large corporations across multiple industries, government agencies, educational organizations, legal, financial, and healthcare sectors. Memberhsip is free - join today!

Possibly Related Articles:
5628
Infosec Island
Infosec Island
Post Rating I Like this!
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.