#security Articles


Bank of America announces anti-phishing strategy

CNet is reporting that Bank of America has announced plans to roll out two technologies to help the firm (and customers) fight against phishing (the use of email and web sites to gain personal information from users). The strategy includes adding features to their web site and leaving a trail …

Security expert switches his company to Macs

This is probably getting pretty old by now, but there are a lot of people who still seem not to get the point: move to a Mac, reap the benefits. Winn Schwartau (contributor to Networld, author of computer security books, and founder of The Security Awareness Company has switched his …

Symantec keeps its word on SecurityFocus

I gotta hand it to Symantec. Despite their blunderous and fearmongering assessment of the pending onset of tragic and multiple Macintosh viruses (no doubt aimed at rescuing flagging sales of their Macintosh products), they seem to be keeping their word on leaving the SecurityFocus free to editorialize as they wish …


FUD: Security Marketing 101

Now, I'd be just about the first person in line to claim that people don't take security seriously enough on computers. However, Symantec may well have reached new heights in the use of FUD (Fear, Uncertainty, and Doubt) to promote the sale of product. A number of articles, such as …

SHA-1 broken

For those into cryptography, you are probably anxiously wondering what "broken" means in this context. For those who aren't, you're probably wondering what SHA-1 is and why you should care. If you're in the latter group, bear with me a moment, while I speak to the former. Broken means that …


Apple hole leaves OSX management open to snooping

A detailed article from AFP548.com (Macintosh server administrator's website) gives a pretty disturbing description of a problem that has been around in OSX for a while. The good news: it was finally fixed in the September 30, 2004 security patch. Those of you doing insecure management of OSX Servers …

T-Mobile adds 802.1X security to hotspots

So, what does this mean for you? If you're a T-Mobile Hotspot user, it means you can avoid the annoying login launch page by directly entering your security information using 802.1X. An article from WiFiNetNews.com indicates that T-Mobile will be running both networks in tandem during the interim …

Busy FCC rules on Tivo sharing and cell phone spam

Well, the younger Powell and his crew were busy yesterday. Rulings were made about cell phone spam and digital broadcast reproduction. On cell phone spam: you can't send it via email... which isn't surprising, but the CAN-SPAM act will now have a registry of domains for wireless providers that can't …

Hi-tech "security risk" Coke can under X-Ray

Blackwater USA (a security training firm in the USA) has posted a document (PDF form) that shows X-Ray pictures of one of the cans from Coca- Cola's Unexpected Summer advertising campaign that involves a cell phone and GPS device in a Coke can. You may recall some fervor (courtesy CNN …


Apple toots own horn at congressional security hearing

Apple's Chief Software Technology Officer, Dr. Avie Tevanian, has given testimony (PDF) along with a number of other computer industry executives, about computer security in the home. The testimony basically talks about how building security in from the ground up, providing good security tools, frequent updates, and network diversity all …

Mac virus threat denounced

Some of you out there who heard earlier this week of a virus aimed at MacOS X, might be wondering why I didn't write about it earlier, unlike Wired did in their article. However, this new article, OS X Trojan Horse Is a Nag, is why. Although somebody has released …

Windows ASN.1 Vulnerability patch required

Microsoft announced a patch yesterday for a significant vulnerability that affects core security protocols on all recent Windows operating systems (Windows 2000- XP). If you have a Windows box, you should immediately run software update and get this fix.

With a name like Can Spam, what did you expect

Technical and legal experts from California (which has some stringent anti- spam laws of its own) are weighing in on the CANSPAM act, passed by congress and signed into law in December by President Bush. The word... well, with it you Can Spam. I'm reminded of the faux advertisement for …

Fish and airport security

An article from the Pittsburgh Post-Gazette describes the ordeal of a college student and her fish trying to get home for the holidays. Suffice it to say that the TSA wasn't particularly helpful or supportive and the fish's life was at stake.

Macintosh security debate

Dueling articles between Lance Ulanoff of PC Magazine (article) and Richard Forno, former Chief Security Officer at Network Solutions (article). The basic gist is that the PC Magazine article was basically a gloat by PC users that there was a vulnerability (fixed in the December update by Apple) found on …

Toll or surveillance device?

Most of us living in the DC area have them-- the little toll boxes that allow us to zip along without stopping to toss coins into the bin. The Associated Press has now written an article about using records from the EZPass system to help solve crimes. The system in …

LoC grants minimal exemptions to the DMCA

According to a story on CNet, the Library of Congress has issued the new exemptions to the DMCA and they are minimal. The exemptions allow for the removal of copy protection systems in four specific cases: obsolete software that requires security dongles, e-books that don't provide for handicapped access (specifically …