Blizzard’s Two-Factor Authentication

Tuesday, July 1st, 2008

Blizzard's announcement of two-factor authentication for World of Warcraft is more significant than people realize. Passwords are obsolete. They are broken. We all recognize this, yet we aren't quite ready to give up on passwords because we haven't an easy alternative. World of Warcraft (WoW) is a good test case. It is ...

How to stop data leakage inside your organization

Tuesday, July 1st, 2008

Sophos announced today that it has published a new white paper describing how businesses can tackle the growing challenge of data leaking by enforcing an acceptable use policy, by applying appropriate controls already available in existing security solutions. The white paper, entitled "Stopping data leakage: Exploiting your existing security investment", examines ...

Cross Environment Hopping

Tuesday, July 1st, 2008

Our research team has identified a web-based attack technique that exploits the growing number of applications that require a web server being run on a local machine. Cross-Environment Hopping (CEH) is a result of this trend combined with the current limitations in browsers’ same-origin policy access restrictions. The CEH technique enables ...

Detecting SSH tunnels

Tuesday, July 1st, 2008

Italian researchers have published a paper on the Detection of Encrypted Tunnels across Network Boundaries. I came across it in a google search because I’ve been thinking of writing a program which does something similar. It doesn’t seem like anyone else has picked up on this research yet so I ...

Hacker Launches Botnet Attack via P2P Software

Sunday, June 29th, 2008

A 19-year-old hacker is agreeing to plead guilty to masterminding a botnet to obtain thousands of victims' personal data in an anonymous scheme a federal cybercrime official described Friday as the nation's first such attack in which peer-to-peer software was the "infection point."The defendant, Jason Michael Milmont, launched the assault ...