Privacy, Security Archive

Windows OneCare Live Preview

To respond to the somewhat alarmingly real threat of spyware, malware, and to a lesser extent viruses on the Windows platform, Microsoft used its recently-acquired security technology combined with its own in-house work to build Windows OneCare Live (codenamed Atlanta). Read here for a preview. Please note that the 'next' button is placed underneath the Google ads, almost invisible.

The Six Dumbest Ideas in Computer Security

"There's lots of innovation going on in security - we're inundated with a steady stream of new stuff and it all sounds like it works just great. Every couple of months I'm invited to a new computer security conference, or I'm asked to write a foreword for a new computer security book. And, thanks to the fact that it's a topic of public concern and a "safe issue" for politicians, we can expect a flood of computer security-related legislation from lawmakers. So: computer security is definitely still a "hot topic." But why are we spending all this time and money and still having problems?"

Quiet Patch Tuesday; Firefox Hole Found (and Fixed, Sort of)

Next week's 'Patch Tuesday' was already going to be quiet, with an update only for Windows. On Friday, Microsoft pulled that update, saying more testing is needed. In related news, officials at the Mozilla Foundation on Friday acknowledged that a potentially dangerous code execution hole exists in fully patched versions of its flagship Firefox web browser. Update: Seems like there already is a (temporary) fix available.

One-Stop Security

Confusion, fear, procrastination; these are words often associated with making decisions about IT security and as threats become more sophisticated it is easy to see why. The increasing popularity for workforce mobility have made detecting and eliminating threats purely from within the corporate network alone an inadequate approach to network security.

IBM Makes Biometric Breakthrough

One of the weaknesses of biometric security systems is that you can't just replace your finger or your eye if someone figures out how to compromise the system, like you can with a password. IBM researchers have applied more sophisticated cryptographic theory to the problem, providing a way to "construct a kind of technological screen separating a user's actual biological identification information from the records stored in profile databases."

Microsoft’s HoneyMonkeys Prove Patching Windows Works

Microsoft unveiled details of its Strider HoneyMonkey research, a project that sniffs out sites hosting malicious code, and hands the information to other parts of the company for patching or legal action. The technical report (pdf) outlines the concept of cruising the Web with multiple automated Windows XP clients - some unpatched, some partially patched, some patched completely - to hunt for Web sites that exploit browser vulnerabilities.

Massive Spyware-Based Identity Theft Ring Uncovered

Researchers from a little-known security software company named Sunbelt Software have seemingly uncovered a criminal identity theft ring of massive proportions. According to one of their employees, Alex Eckelberry, during the course of one of their recent investigations into a particular Spyware application - rumored to be called CoolWebSearch - they've discovered that the personal information of those "infected" was being captured and uploaded to a server.

Dan Kaminsky on Microsoft’s Security

SecurityFocus published an interview with BlackHat/Defcon speaker Dan Kaminsky. He was guest-hacker at the Microsoft BlueHat event, and met Redmond's engineers and management. His conclusion: "My sense is that a combination of respect for SP2 and growing fear of Google (which has an entirely different, and arguably more managable security posture than Microsoft can achieve) has really pushed people towards seeing security in 2005 as stability was in 2000/2001."

Securing Wireless Technology: Wireless Devices, Part I

Wireless networking frees mobile workers from wires and cables, allowing them to collect and view data whenever, wherever they choose. The popularity of wireless networking is broad and continues to grow. The Gartner Group stated in an April 2005 study that by 2015, the average urban citizen in the United States and Europe will use at least six wireless networking technologies per day. read more.