Viewing posts from January, 2009
trolltechs-greenphone
Posted by: admin 15 years, 10 months ago
Trolltech announced their Greenphone today. It is a development worth watching for those of us in the wireless application development space.
trackback-comment-spam
Posted by: admin 15 years, 10 months ago
Sorry for the lack of posts recently, but we've been busy on other things and I have been trying to deal with trackback and comment spam, which according to our ISP was causing a DOS attack. I find that a bit hard to believe, but there you have it. The connection seems to be working again. We also upgraded the web server and added squid and mod_security. Comments and trackbacks are still turned off until I can fine tune mod_security enought to feel comfortable turning them on again.
tsa-worker-sentenced-for-falsifying-reports
Posted by: admin 15 years, 10 months ago
According to the Atlanta Business Chronicle, Robert Wilson, 51, of Ellenwood, Ga. will be doing four months in federal prison for falsifying records.
From about November 2004 to January 2005, Wilson filed at least eight inspection reports with TSA that contained false information. For example, Wilson falsely claimed that he inspected gates that were in fact closed and inaccessible due to construction. Wilson also falsely reported that he had made an inspection of an airline to ensure its compliance with security regulations. Wilson also falsely reported that he performed some inspections with TSA employees who, according to time and attendance records, were not on duty at the time.
stock-market-values-and-information-security
Posted by: admin 15 years, 10 months ago
There has been some excellent research done on the impact of information security breaches on the market cap of affected firms (which directly impacts their cost of capital): "The economic cost of publicly announced information security breaches: empirical evidence from the stock market Katherine Campbell, Lawrence A. Gordon, Martin P. Loeb and Lei Zhou Accounting and Information Assurance, Robert H. Smith School of Business, University of Maryland, 2003" (http://brief.weburb.dk/archive/00000130/01/2003-costs-security-on-stockvalue-9972866.pdf)
This UMD study found that a firm suffering a breach of 'confidential information' saw a 5% drop in stock price while firms suffering a non-confidential breach saw no impact.
herman-munsters-identity-stolen
Posted by: admin 15 years, 10 months ago
As if you needed more proof that identity thieves are lowly scum, they have now stolen Herman Munster's identity. If they had any class at all, they would have gone for Gomez Adams.
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)