IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

President Obama And The Blackberry

31 January 2009 By Saran

blackberry_8830_1Oh how we love to talk about technology and the lives of public figures, don’t we? I guess that while we’re at it, there is none better to talk about than the new US President and his affinity for his Blackberry?

As much as a lot of people might love this revolutionary device, it cannot be denied that it does present some security issues. As any other wireless device that transmits data over the airwaves, there is a certain degree of risk. Anyone can intercept the signals emanating from the devices as well as the signals going to it. If we’re merely talking about you and me, it should not be that much of an issue – I got nothing to hide, really. But then again, if you’re talking about the leader of the greatest nation on earth (albeit subject to argument), it’s a totally different matter.

All throughout his campaign Obama was seen fiddling with his Blackberry. Now that he is president, will the status quo be maintained? Rumor has been going around that he is now to use a really high tech gadget, the Sectera Edge, which is made by General Dynamics, a defense contractor. This baby is no ordinary smartphone and costs more than your usual computer. At $3,350, it runs on Windows but is NSA certified to be as secure as secure can be.

But is Obama really using the Edge? Sorry to disappoint tech fans out there but it seems that Obama is still using the BlackBerry 8830.

Filed Under: General, Wireless Security

Viruses Prey on Mobile Phones

21 October 2008 By Saran

It should not really be surprising at how mobile phones would be the target of most viruses today. For one, they are the hot commodities we hear of today and similar to PC computing before, they are the hot target viruses want to wreck havoc on.

It is not really constrained to creating a mess. They are a challenge. Their wireless means of surfing the web and using programs that may be hard to penetrate with the basic security features is the penetration issue that any hacker today would want to conquer.

Spammers are bound to have their teeth in as well. These two juvenile delinquents of the cyber world are bound to be aggressively aching to get their name in the mobile internet issues. The opportunity is simply too tempting to pass up.

According to its annual Emerging Cyber Threats report, cybercriminals will start targeting smartphones as they are being used more frequently by users when it comes to financial matters and therefore are a source of sensitive personal data such as credit card and bank account details.

Source

Filed Under: IT Security Basics, Network Security, Real-World Issues, Security Policies, Spyware, Wireless Security Tagged With: cyberworld, mobile phones, viruses

The Perspective System To Fend Off Hackers

26 August 2008 By Saran

Here should be a piece of good news to WiFi networks. Apparently, finding a solution to how hackers are able to use wireless access to do their dirty work has been a growing concern. For some reason, they are able to access vital information and computers and then create havoc as they wish. Apparently they have a modus operandi to which do-gooders often have something malicious in mind, mostly to do something foolish such as injecting viruses or even accessing another computer and perhaps deleting some files without them knowing it.

But now, the Perspective System is being groomed as a low cost that will answer these issues. Apparently the biggest targets are the websites and online businesses and security in transactions is definitely in question. One this system is installed, security for various issues that include domain names system software will hopefully be covered.

“It’s very, very, very easy for someone to convince you to go through their computer” when making connections through public WiFi, said David Andersen, assistant professor of computer science. A user who thinks he is linked to an airport or coffee shop “hot spot,” for instance, might actually be linked to a laptop of someone just a few seats away. “A lot of people wouldn’t even know they’ve been attacked,” he added.

The Perspectives system is designed to aid in authenticating Web sites for financial services, online retailers and other transactions needing secure communications. By independently querying the desired site, the system can double check whether each is receiving the correct authentication information, called a digital certificate.

Source

Filed Under: Real-World Issues, Security Policies, Wireless Security Tagged With: domains, hackers, perspective system, software, wifi

Encryption – Why people shun away from it even now? (Part 2)

1 June 2008 By Saran

If you happen to be a small or medium scale company that cannot afford multiple data stores and infinite numbers of mirrored hard drives, that becomes a problem. An encrypted hard disk in a laptop that gets banged up damaging the hard disk may still have some of the information intact enough for recovery but damage some of the vital keys and software and you are left hanging by a thread or down in the gutters. Data recovery is possible but only through expensive methods with the hard disks being opened up, the platters extracted and installed into another similar hard disk for data extraction. Only the military and federal government would have enough cash to burn in terms of data recovery at that level for the price is computed in the amount of megabytes recovered and on a per hard disk basis, and imagine a 1 terabyte drive at say $50/MB then you’d be scratching your head by now, and that’s just for a single drive.
The risks of identity theft and information leakage is real but the technology is still quite prone to failure even with today’s quad-core which is why we didn’t discuss the performance issue in the discussion. Today’s multi-core processors are capable of handling complex tasks such as real time encryption and decryption as if there was nothing happening on the background. The performance issue has been addressed by more powerful microprocessors but the reliability of the hard disks which stores the information and even the CD’s are still quite weak. Till there is more definite proof that all parts of the computer has reached such a reliable level that failure is a less of a factor more people would still retain their own proprietary security measures (birthday passwords, flash thumb drives that always get lost and physically carrying their discs with them).

Filed Under: Backups, Cryptography, General, IT Security Basics, Malware, Network Security, Operating Systems, Physical Security, Real-World Issues, Storage, Wireless Security Tagged With: encryption, Security Policies

IT Security – the outlook for 2008

28 December 2007 By Saran

think.jpg
Wireless networks and ways of protecting them will top most of the IT Security issues for the coming year. Predictions place wireless networks to slowly take over the now existing networks and development into WiMax which has more coverage area in terms of distance compared to WiFi is making this a fast reality. Players in the WiMax development include the biggest names in the wireless network area such as Intel, Samsung, Motorola and many more. Innovations will continue to push the technology to better and improved performance like never before.

Studies also show that more and more workers are turning to wireless computing for their network and office needs doing what they do in the most unlikely places such as coffee shops and anywhere else they can get a stable and sustainable connection. It also raises ethics issues for people will no longer be out of reach of networks and equally their jobs. Family time and other more casual needs for privacy and quiet time will be secondary for your boss can always reach you anywhere on the planet there is coverage of a network.

The death of satellite based communications has spurred rapid development of Voip allowing anybody connected to the internet instant access to telephone-like services without the use of dedicated telephone lines. This saves on telephone bills and has been in use heavily initially with call centers and has now shifted to mainstream use so more is to be expected of the technology in the years to come which may ultimately result in the death of the standard telephone service many opting for high-speed internet access instead.

The release of the Quad-core processors and planned development of more multi-core microprocessors fuels the future of laptop supercomputers which may come in following years. This and all of the better and improved technology will allow computing to soar into new heights making them a mainstay in our everyday lives for the future.

[tags]Multi-core Processors, Mobile Computing, Mobile Workforce[/tags]

Filed Under: General, IT Security Basics, Network Security, Physical Security, Privacy & Anonymity, Real-World Issues, Security Policies, Storage, Wireless Security Tagged With: Security-Outlook-for-2008, Wireless Security

Network Assessment tools – for a better/secure network

25 December 2007 By Saran

netsecurity.jpg
In the time when people are going more and more mobile making the telecommuting concept a true reality, the existence of the wall-less office has slowly been realized. The shift to WiFi and other wireless networking solutions has allowed people to work like never before without the wires that tied them physically to desks. More and more areas like metropolitan areas are putting up hot spots that allow constituents to work within specific areas which already have existing wireless networks. Even offices have shifted to the technology due to cheaper implementation without the expensive wires needed for each and every workstation. Maintenance of said wired networks also proved to be a very challenging task due to the restricted spaces and conduits which housed them behind walls, ceilings and under the floors. WiFi allowed then network to function without physical connections allowing mobile devices to be connected and linked to the network which could be taken anywhere in the office.

The wireless office has indeed given us more in the area of freedom but it has also created a more vulnerable network for control on who gets which access and other security issues quickly emerged. Software and hardware systems like Retina from eEye Corporation allowed network engineers and managers to analyze and address security loopholes such as unauthorized devices connected to the network like the occasional iPhone and most other unauthorized wireless devices. It also serves as an analysis tools on the proper placement and function of wireless antenna which can be analyzed based on signal strength. Weak signals can mean re-positioning the antenna system or worse it could be a signal of a pending failure for a specific network device. It can also show the effectivity of the network in terms of utilization and bandwidth that is being effectively shared/used by the users.

[tags]Network Invetory, Network Usage, Maximizing Internet Use[/tags]

Filed Under: Cryptography, General, IT Security Basics, Network Security, Privacy & Anonymity, Real-World Issues, Security Policies, Wireless Security Tagged With: Data-integrity, Network Security, Wireless-Network-Security

Newer Posts
Older Posts

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security