Privacy, Security Archive

Dan Kaminsky on Microsoft’s Security

SecurityFocus published an interview with BlackHat/Defcon speaker Dan Kaminsky. He was guest-hacker at the Microsoft BlueHat event, and met Redmond's engineers and management. His conclusion: "My sense is that a combination of respect for SP2 and growing fear of Google (which has an entirely different, and arguably more managable security posture than Microsoft can achieve) has really pushed people towards seeing security in 2005 as stability was in 2000/2001."

Securing Wireless Technology: Wireless Devices, Part I

Wireless networking frees mobile workers from wires and cables, allowing them to collect and view data whenever, wherever they choose. The popularity of wireless networking is broad and continues to grow. The Gartner Group stated in an April 2005 study that by 2015, the average urban citizen in the United States and Europe will use at least six wireless networking technologies per day. read more.

Desktop Port Proliferation a Security Risk?

Opera's announcement of in-browser support for Bittorent highlights the trend for common desktop applications requesting an ever-larger number of TCP ports to be opened up for them, essentially poking holes into firewalls. File transfer apps, VoIP, games, and other programs routinely request open ports, and that's a security risk, say some security experts.

Study Shows Windows Beats Linux on Security

Linuxlookup.com is reporting Wipro surveyed 90 companies in the U.S. and Western Europe with 2,500 to 113,000 employees where both the Windows and open source operating systems were simultaneously being run. The outcome: Windows beats Linux in Security. "We already know how to secure a Windows-based solution and keep it running smoothly,” says Stephen Shaffer, the airline’s director of software systems. “With Linux, we had to rely on consultants to tell us if our system was secure. With Windows, we can depend on Microsoft to inform us of and provide any necessary updates."