Monthly Archives: February 2009
Intel healthcare: SOA Expressway for Health Care http://www.intel.com/healthcare/ps/soa/index.htm?iid=health+lhn_soa Intel has created a scalable, easy to deploy health care network with the hopes of enabling sharing and collaboration of health care information. Intel Health Care network is build upon common components … Continue reading
Verisign Will Support DNSSEC by 2011
Within the next two years Verisign has promised that it will support DNS Security extensions across all of the domains that are top-level. DNSSEC provides measures that allow for primarily the authentication of the origin of DNS data and also … Continue reading
Current events: Adobe Reader Vulnerability
Hackers are targeting a zero-day vulnerability affecting Adobe Reader and Acrobat with malicious PDF files. This vulnerability would cause the application to crash and could potentially allow an attacker to take control of the affected system. Hackers have been spreading … Continue reading
XSS in the Wild (Updated)
When I recently tried to look up some information about the song L’America by The Doors, I stumbled upon the site songfacts.com (http://www.songfacts.com/detail.php?id=278). At the site, I was immediately greeted by a popup box cheerfully proclaiming “HAI2U”. After having dealt … Continue reading
Security Review: Self-scanning Checkout
Self-scanning checkout, also called “self-checkout” is an automated process that enables shoppers to scan, bag, and pay for their purchases without human assistance. A typical self-scanning checkout lane looks like a traditional checkout lane except that the shopper interacts with … Continue reading
State of Utah Fleeced for $2.5 Million
Over 2.5 Million dollars was stolen from the State of Utah’s Treasury, according to a recent article in the Salt Lake Tribute. According to the article, an attacker obtained a vendor number for the University of Utah’s construction department, then … Continue reading
Current Event: YoBusted.com, busted?
According to a recent article from Business Week, a photo-sharing site, YoBusted.com, has crossed the line between maintaining personal privacy and extortion. This site allows users to post incriminating pictures of friends without proof that his or her permission to … Continue reading
Security Review: Automobiles
In the United States, automobiles are everywhere. Most middle-income families own more than one vehicle, and chances are that everybody knows of at least one person whose vehicle has been broken into or stolen. Cars, trucks, and SUV’s are very … Continue reading
Weak Password
According to yahoo!News, the statistics of 28,000 passwords that are recently stolen from a popular US website that is posted in physorg.com “16 percent took a first name as a password … 14 percent relied on the easiest keyboard combinations … Continue reading
Current events: Microsoft offers money for catching Conficker virus creator
I didn’t pay much attention to the event mentioned earlier about Conficker virus, until this new event related to that event arose – after all, is it such a rare occasion being infected by a virus. To remind you, it … Continue reading