Skip to main content

The WiKID Blog

Viewing posts by admin

15-percent-of-corporate-pcs-have-keystroke-loggers

According to David Aucsmith, architect and CTO, Security Business & Technology Unit at Microsoft, 15% of corporate PCs have key stroke loggers.

zone-h-attack-really-a-dns-hijacking

According to the Register the recent 'defacement' of Zone-H was really a DNS hijacking. While it is not clear how the attackers took control of the domain, it points out the DNS system is not a reliable security mechanism. It is less likely that an attacker would get contorl of a major financial institution's DNS registration (or is it?), but DNS-cache poisoning is very likely.

tower-group-pushes-two-factor-authentication-for


Clearly, we need to do a better job of promoting WiKID.

trusted-computing-for-mobile-devices

There is a new specification for mobile phone security called the Mobile Security Specification. It is essentially trusted computing for cell phones.

The specification has been years in development, said Janne Uusilehto, head of Nokia product security and the chairman of the working group developing this technology. "It is a big deal. This is the first time that we have created such common security specifications for all handheld devices," Uusilehto said.
More:
When these devices appear, they will make things more difficult for data thieves and mobile virus writers. Down the line, the technology could be used to build electronic wallets into mobile phones. In general terms, the specification calls on hardware vendors to store protected information in a secure area of the phones. Similar to the Trusted Platform Module used in PCs, this technology could be used to ensure that the phone's operating system, applications and data have not been tampered with.

All the usual trusted computing warnings apply here, but perhaps more so as cell carriers maintain a 'walled garden' and can limit the devices available. They are also essentially 'tri-opolies'. It seems likely that you will be able to buy a computer without TCP in the future. You might not be able to buy a cell phone without it (that works on a carrier).

when-the-cone-of-silence-isnt

MSNBC has the a story:

MOSCOW - Intentionally or not, the Russians fed out audio of Thursday’s closed lunch meeting between Secretary of State Condoleezza Rice and Russian Foreign Minister Sergey Lavrov, revealing a fractious exchange over the wording of an official Group of Eight statement on Iraq.

Recent Posts

Archive

2024
2022
2021
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008

Categories

Tags

Authors

Feeds

RSS / Atom