Viewing posts by admin
How-to-get-an-unlimited-information-security
Posted by: admin 16 years, 3 months ago
In the past, I have blogged about how much to budget for info sec, how information security creates value for a company, and other posts designed to help info sec personnel make their case. Well, now I have decided that that is all bunk compared to the advice I am about to give. The new tactic: Bribery.
How-much-to-spend-on-data-breach-protection
Posted by: admin 16 years, 3 months ago
In a previous post, I discussed how much to spend on information security based on Gordon & Loeb's book Managing Cybersecurity Resources: A Cost-Benefit Analysis. The crux: spend no more than 37% of your expected loss.
7-easy-steps-to-maximizing-your-fraudulent-stock
Posted by: admin 16 years, 3 months ago
The SEC has noticed a dramatic rise in fraud against online brokerage accounts. This is a very interesting article in that it shows how an attacker can take over accounts and make money without necessarily removing money from those accounts. All they need is a couple of "legitimate" account that the fraudsters open, a thinly traded small-cap stock and to control a couple of pwned accounts with enough money to manipulate the targeted stock. The article describes "pumping" as using pwned accounts to drive up the price of stocks that you hold. However, you can also make money on the way down:
Website updates
Posted by: admin 16 years, 3 months ago
As you have seen no doubt, we've updated the website. While it has a new look and feel, most of the effort has gone on behind the scenes. We've upgraded plone and added some new features. We've added forums for both the Community and Enterprise versions. We will close the sourceforge.net forums soon.
Updates-on-the-blog-the-extranet-WiKID-etc
Posted by: admin 16 years, 3 months ago
I have ended the experiment of using anonymous two-factor authentication as a turing test. I don't know for sure if it kept people from posting, but I did get at least one whiny email from a potential commenter saying he didn't have time to sign up for WiKID just to post to my lame blog. I won't say who it was, but I guess your new paymaster must keep you pretty busy, though you seem to have enough time for your own side projects. I have implemented a standard captcha instead.
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)