Security Corner:

March, 2008

1

March 25, 2008  9:12 PM

You Clicked? Really? Are You Nuts?!

Ken Harthun Ken Harthun Profile: Ken Harthun

This has to be one of the most evergreen security topics to come along; no matter how much anyone writes about the dangers of clicking on links or opening attachments in unsolicited email, people continue to do it. SANS NewsBites, March 25, 2008,...

March 25, 2008  6:58 PM

Wireless Headset Security Nightmare

Ken Harthun Ken Harthun Profile: Ken Harthun

Wireless headsetBeing a Ham Radio operator, I've always understood the risk inherent in using radio signals to transmit sensitive information: anyone with the right equipment can receive and record...


March 24, 2008  9:06 PM

Encrypt, You Must, But Do It Right!

Ken Harthun Ken Harthun Profile: Ken Harthun
Networking

EncryptionOne of the clients I service has information that falls under HIPAA. Prior to last week, all of the data was stored on a server located behind a strong firewall in a building with good...


March 20, 2008  1:23 AM

Paranoid About Hard Drive Security? Try This

Ken Harthun Ken Harthun Profile: Ken Harthun
Networking

My company serves as the IT department for several medical, legal, social service, and banking organizations in our area. I don't have to tell you that every one of these organizations deals with information that falls under various government data security and privacy acts. Every one of these...


March 12, 2008  2:04 AM

Turn Off Message Preview in Your Email Client

Ken Harthun Ken Harthun Profile: Ken Harthun

Some of these tips may very well be "everybody knows" types of things, but I find that these are often the things that get overlooked. That's why I'm publishing them as computer security maxims. Take a look at the recent furor surrounding the


March 9, 2008  3:41 PM

Uncle Sam Wants You–to Become a Cyberspace Warrior

Ken Harthun Ken Harthun Profile: Ken Harthun

Cyberwarrior A while back, I wrote an article entitled "Will You Be Used As a Weapon Against Your Own Country?" The...


March 8, 2008  6:08 PM

Are You Lazy? Then You Have Security Risks

Ken Harthun Ken Harthun Profile: Ken Harthun

True computer and network security takes a lot of work to implement and it takes a lot of work to use. Despite training (if any) and admonitions by their supervisors and the IT Sticky note passworddepartment, the lazy...


March 2, 2008  5:31 PM

Disk Encryption Vulnerable to Cold Boot Attack

Ken Harthun Ken Harthun Profile: Ken Harthun

According to researchers at Princeton University, it's possible to recover encryption keys from memory for some time after a computer is powered down. Their paper, "Lest We Remember: Cold Boot...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: