IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

The Perspective System To Fend Off Hackers

26 August 2008 By Saran

Here should be a piece of good news to WiFi networks. Apparently, finding a solution to how hackers are able to use wireless access to do their dirty work has been a growing concern. For some reason, they are able to access vital information and computers and then create havoc as they wish. Apparently they have a modus operandi to which do-gooders often have something malicious in mind, mostly to do something foolish such as injecting viruses or even accessing another computer and perhaps deleting some files without them knowing it.

But now, the Perspective System is being groomed as a low cost that will answer these issues. Apparently the biggest targets are the websites and online businesses and security in transactions is definitely in question. One this system is installed, security for various issues that include domain names system software will hopefully be covered.

“It’s very, very, very easy for someone to convince you to go through their computer” when making connections through public WiFi, said David Andersen, assistant professor of computer science. A user who thinks he is linked to an airport or coffee shop “hot spot,” for instance, might actually be linked to a laptop of someone just a few seats away. “A lot of people wouldn’t even know they’ve been attacked,” he added.

The Perspectives system is designed to aid in authenticating Web sites for financial services, online retailers and other transactions needing secure communications. By independently querying the desired site, the system can double check whether each is receiving the correct authentication information, called a digital certificate.

Source

Filed Under: Real-World Issues, Security Policies, Wireless Security Tagged With: domains, hackers, perspective system, software, wifi

Flaws in Domain Name Service Providers

6 August 2008 By Saran

If you think a website has problems as far as security issues is concerned then better check out the domain names as well. Why these domain name service providers are the least things that can create problems to network security issues, apparently there are flaws that many would find interesting to hear about.

A large number of network security professionals have been gathered in Las Vegas for the annual Black Hat computer security conference and among the main topics to be discussed include the most anticipated presentation of IO’s Dan Kaminsky regarding flaws in the Domain Name Service software.

The flaw was reportedly discovered quite some time ago but was kept under wraps. So now, the participants over at the Black Hat computer security conference will learn first hand about the details of this flaw.

As a professional, you would think that these issues didn’t even cover domain name handling. But apparently in the world of technology, nothing is excluded. You just never know what to expect and if you value computer and network security, it would be best to cover all aspects starting from your software all the way down to the least expected components of your IT infrastructure. You just never know what could possibly be contracted and it may become a big issue in the long run.

The most anticipated presentation at the show, however, will be IOActive’s Dan Kaminsky when he unveils details of the flaw he discovered in Domain Name Service software. The flaw had been kept under wraps in an attempt to proactively convince major network suppliers and operators to patch the flaw before information about it was made public. Unfortunately, the flaw was leaked to the public on a blog site, and the race was on to patch servers before hackers could exploit the vulnerability.

Source

Filed Under: Network Security, News, Operating Systems Tagged With: domain names service, domains, internet, network

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security