Monthly Archives: February 2008
Smart Pillbox Security Review
Summary “Smart pillbox could be a lifesaver” that is the title on the recent news in MIT in the world. It is design to be used by elderly people so they can properly take their medication. The purpose will be … Continue reading
Insignia Photo Frame, Complete with Pre-installed Malware
An Insignia digital photo frame has been pulled off the shelves once it was discovered that the units were shipped with trojans. Installed by the (Chinese) manufacturer, the trojan bypasses Windows Firewall and anti-virus software and collects gaming passwords. We … Continue reading
ISP vs. BitTorrent
Since ISPs, most notably Comcast, some time ago began identifying and purposefully destroying or severely throttling BitTorrent connections passing through their networks, the struggles on both sides of the fence have been nothing short of a game of cat and … Continue reading
Number of Rogue DNS Servers Increasing
Researchers from Google and the Georgia Institute of Technology have published a paper indicating the increasing number of attacks from the use of rogue DNS servers (the paper estimates that there are currently about 68,000 of these servers).
Valentine’s Day Malware
Human beings are often considered one of the weakest links in a security system, and this vulnerability is typified (and exploited) by the proliferation of Valentine’s Day malware (and their associated delivery mechanisms). The first article referenced below describes two … Continue reading
Security Review: Online Banking
Online Banking – Many banks now provide an online application that will let the bank’s clients manage their funds. This includes both, viewing, as well as transferring funds to arbitrary third parties through a feature called ‘Online Bill Pay.’ Thus, … Continue reading
xkcd comic on key signing parties
This comic should make more sense after today’s lecture.
Security Review: Airport Security
Anyone who has travelled within the past 6 years has experienced the excruciating joy of going through modern airport security. For most domestic flights your checked bags go through one set of security procedures, and your person and carry on … Continue reading
Security Review: IE7 Protected Mode
The latest version (7) of Microsoft’s Internet Explorer web browser, like their latest Windows (Vista) operating system, is supposed to be the most secure version in the product’s history. A complete security review of either IE7 or Vista is outside … Continue reading
Security Review: Pop Machines
While we have access to reasonably priced soda in the ACM lounge or the Benson store, the average person looking for a convenient drink has to shell out between $1.75 and $2 to buy from a pop machine. But why … Continue reading