Skip to main content

The WiKID Blog

Viewing posts from January, 2009

the-externalities-of-dns-configuration

According to a recent study by DNS appliance maker Infoblox, over 50% of the Internet's domain name servers allow recursive name services - requiring a name server to relay requests to other name servers. If an attacker "poisons" the list of name servers, users are directed to a fake site, even if they manually enter the correct web-address.

the-open-source-security-debate

There's been plenty of debate over whether open source software is more or less secure than proprietary software and it now seems to have mostly died down as people realize that "it depends" is the correct answer. OSS camp points to Apache and other packages and the proprietary camp points out the vast improvement in IIS.

tjx-5-takeaways

Computerworld has a summary commemorating the one-year anniversary of the TJX breach. I agree with the article. The PCI Standard is a work in progress; Bad guys are hard to catch; etc.

top-9-reasons-to-embrace-two-factor-authentication

Passwords have been around forever and it's starting to show. The next level of authentication security is two-factor authentication. Your ATM card is an example of two-factor authentication: you need both possession of the card and knowledge of the PIN to get cash. There are a number of factors that are pushing two-factor authentication toward a tipping point.

too-bad-he-is-not-dr-obrien

From Neatorama:

Graham O’Brien thought he was just unlucky when he couldn’t access his bank account by phone. But it turned out that the call center staff thought he was a woman trying to defraud the bank because of his squeaky voice.
You would think that they could tag his records with some indication that he's got a squeaky voice.

Recent Posts

Archive

2024
2022
2021
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008

Categories

Tags

Authors

Feeds

RSS / Atom