The case of the tampered USBs

Monday, May 12th, 2008

For years, organizations have focused on the evil outsiders that were behind attacks on their networks. Firewalls, IDS, IPS technologies have come to the rescue and have resulted in impregnable walls protecting organization networks. Now with strong walls, the challenge is ensuring the trusted insiders don't walk out with the ...

Google scans web traffic for nasties

Monday, May 12th, 2008

Google's new Web Security for Enterprise service enables companies in the US and Europe to safeguard their internet traffic with protection against viruses and spyware and malicious URLs. According to Google the system "powered by Postini, stops web-borne spyware and viruses before they infiltrate your network and compromise or disable ...

Free public WiFi

Monday, May 12th, 2008

I recently found myself in an airport terminal with a laptop and time to kill. Not knowing what the WiFi options were, I let Windows XP search for available wireless networks. As you can see below, one of the networks was called "Free Public WiFi". If this happens to you, ...

Human Area Networking (HAN)

Wednesday, May 7th, 2008

RedTacton is a new Human Area Networking technology that uses the surface of the human body as a safe, high speed network transmission path. Using a new super-sensitive photonic electric field sensor, RedTacton can achieve duplex communication over the human body at a maximum speed of 10 Mbps. RedTacton uses the minute ...

Do not Underestimate Physical Security

Tuesday, May 6th, 2008

Security in IT is everywhere: firewalls, proxies, anti-[spam|virus], IDS and more! But what about physical security to your IT infrastructure? Read the following story: Peter Gabriel’s web site was off the web due to a server theft! I would like to know how the thieves performed! Why spend money to protect ...