Viewing posts by admin
password-on-post-it-note-reveals-affair
Posted by: admin 16 years, 3 months ago
According to ComputerWeekly's Downtime blog, a password on a post-it note allowed a temp to access email of a London mayor's office staffer, revealing an affair with a married woman. Downtime's take:
Downtime expects Ken to have already ordered a two-factor authentication scheme to protect those afflicted with short-term memory difficulties, banned 3M’s best-selling product and instructed HR to re-do the background checks to weed out anyone with a malicious sense of humour.
more-on-low-frequency-high-impact-events
Posted by: admin 16 years, 3 months ago
Adam's post yesterday on the agency problem got me thinking more about low-frequency, high-impact events and their predictability. His post was about Bear Stearns and how employees lost money. The interesting point for me was that those are the people that should have been in the best position to know that the potential for a high-impact event was increasing.
banks-slow-intrabank-transfers-to-help-spot-fraud
Posted by: admin 16 years, 3 months ago
According to Gartner, four UK banks have slowed intrabank transfers to try to reduce fraud.bankash
Posted by: admin 16 years, 3 months ago
Dave Evans from Teros pointed out that the PWSteal.Bankash.D trojan includes two lists: one for sites thatis-a-password-protected-computer-like-a-locked-box
Posted by: admin 16 years, 3 months ago
A recent Cirtcut Court decision found them to be so:
The 10th Circuit's recent 2-1 decision in U.S. v. Andrus, No. 06-3094 (April 25, 2007), recognized for the first time that a password-protected computer is like a locked suitcase or a padlocked footlocker in a bedroom. The digital locks raise the expectation of privacy by the owner. The majority nonetheless refused to suppress the evidence.In the case in question, the father of the suspect gave the officers permission to search the house and his son's computer. The test for the majority was pretty high:
Judge Michael R. Murphy, joined by the court's newest member, Judge Neil M. Gorsuch, said the legal test is "whether law enforcement knows or should reasonably suspect because of surrounding circumstances that the computer is password protected."While the dissenting judge pointed out that it might be hard to determine if a computer is password protected:
In dissent, Judge Monroe G. McKay called the unconstrained ability of law enforcement to use forensic software to bypass password protection without first determining whether such passwords have been enabled amounts to "dangerously sidestepping the Fourth Amendment."
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)