LogMeIn can control some PCs, even when off

Sunday, September 20th, 2009

During a recent talk with LogMeIn CEO Michael Simon, I learned about the company's new LogMeIn Central dashboard for IT managers, designed to help them keep tabs on thousands of computers at a time. I also heard about the new version of virtual network service Hamachi, which makes it a competitor ...

Amazon Web Services launches two factor authentication

Monday, September 7th, 2009

Protecting the management account for cloud services can be one of the most critical security points of a cloud-based solution. Arguably, the account is more important than instance and operating system security for cloud workloads. Amazon web services (AWS) has recently introduced a new feature, Amazon web services multi-factor authentication ...

Fake ATM doesn’t last long at hacker meet

Sunday, August 2nd, 2009

Criminals running an ATM card-skimming scam made a big mistake this week: They tried to hit the Defcon hacker conference in Las Vegas. As the conference was kicking off a few days ago, attendees noticed that at ATM placed in the Riviera Hotel, which plays host to the annual event, didn't ...

Laptop Lojack Vulnerability Exposed

Friday, July 31st, 2009

A pair of computer security researchers have discovered a BIOS vulnerability caused by the Computrace Laptop Lojack software, serving as a rootkit to potentially let malware nest and thrive in an estimated 60% of newish laptops. The research team of Alfredo Ortega and Anibal Sacco say that when malware infects a ...

Computer Security Myth: Defeating Keyloggers With Onscreen Keyboards

Monday, June 15th, 2009

I recently came upon a few articles that once again offered the computer security tip to use onscreen keyboards to defeat keyloggers. Most of these tips are suggesting to install an onscreen keyboard or make use of the default one of the operating system to defeat keyloggers while making transactions ...