Skip to main content

The WiKID Blog

The WiKID Blog, musings on two-factor authentication, information security and some other stuff.

worried-about-communicating-privately-with-your

Is TOR not not cutting it for your top-secret embassy communications anymore? Try JAP, which is probably not sponsored by the NSA at all.

mitm-attacks-tokens-vs-phishing-and-mutual

Kurt at anti-virus rants has a pair of posts, one on what is man-in-the-middle attack and a follow up on why tokens won't stop phishing, which lead me to an earlier post on why safe site indicators fail.

more-on-de-perimeterization

Having just posted on de-perimeterization, I thought that this quote from Scott Borg of the U.S. Cyber Consequences Unit on the consequences of breaches:

"We started seeing huge vulnerabilities," Borg said Wednesday at the GovSec conference in Washington, where the draft document was released. Most of the systems were compliant with current security checklists and best practices. "And portions of those systems were extraordinarily secure. But they were Maginot Lines," susceptible to being outflanked.

wikid-systems-in-trouble-again-for-bribing

Today it was revealed that selected bloggers that include positive mentions of WiKID Systems' two-factor authentication system were promised that could potentially receive a new-to-them laptop for their efforts. The laptops were described as Dell Latitude CPx with a screaming fast in-its-day P11600mhxz chip that are currently stacked unused in the closet and a dual-boot Thinkpad T23 with a persnickity display and built-in Snarkiness (TM) for the best blogging experience.

15-percent-of-corporate-pcs-have-keystroke-loggers

According to David Aucsmith, architect and CTO, Security Business & Technology Unit at Microsoft, 15% of corporate PCs have key stroke loggers.

Recent Posts

Archive

2024
2022
2021
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008

Categories

Tags

Authors

Feeds

RSS / Atom