Simple Pharming

Monday, May 5th, 2008

Today I decided to give a very brief example on pharming and why it's so easy to pharm surfers with little or no skills. Usually, browser exploit writers give simple examples on how to read the boot files, or launch a calculator. There is so much you can do with ...

Safest Way to Bank Online? Your Cell Phone

Monday, May 5th, 2008

So you want to bank safely online? Then ditch your computer and make the transaction via your cell phone instead. Using a mobile handset for this most sensitive online act might sound counterintuitive, given that phones are prone to being lost or stolen, but your cell phone might actually be safer ...

The ABCs of securing your wireless network

Sunday, May 4th, 2008

Ars Technica's original Wireless Security Blackpaper was first published back in 2002, and in the intervening years, it has been a great reference for getting the technical lowdown on different wireless security protocols. As a sequel to the original blackpaper, we wanted to do something a little more basic and ...

Phishers Mimic Google Adwords

Saturday, May 3rd, 2008

Google Adwords account holders are being targeted by criminals out to trick them into handing over credit card information using a clever URL spoof that has gained popularity in recent weeks. On the face of it, the scam follows a traditional attack route involving the sending of spam e-mail to random ...

IronKey Unveils 8GB Version of Secure USB Drive

Friday, May 2nd, 2008

IronKey Inc., maker of the world's most secure flash drive, announced today availability of the 8GB-capacity of its IronKey secure USB devices. IronKey brings unprecedented mobile data convenience and security to individuals and organizations with its rugged, waterproof and tamper resistant USB drives that include always-on hardware encryption, strong authentication, portable ...