|
Browsers, phishing, and user interface design
2006-06-05 Phishing works for so many reasons, we need to rethink browser and user interface design to provide some real-life security to the average user who doesn't see or understand the security cues. http://www.securityfocus.com/columnists/405 Abandon e-mail! 2006-05-30 Kelly Martin takes a step back from e-mail's unstoppable phishing-virus-spam epidemic and imagines a world where secure e-mail could be the next big killer app. http://www.securityfocus.com/columnists/404 Protection from prying NSA eyes 2006-05-15 From the U.S. Fourth Amendment, the Stored Communications Act and U.S. wiretap laws to the Pen-register statute, Mark Rasch looks at legal protections available to the telecommunication companies and individual Americans in the wake of the NSA's massive spying program. http://www.securityfocus.com/columnists/403 The quest for ring 0 2006-05-10 Federico Biancuzzi interviews French researcher Loïc Duflot to learn more about the System Management Mode attack, how to mitigate it, what hardware is vulnerable, and why we should be concerned with recent X Server bugs. http://www.securityfocus.com/columnists/402 Innovative ways to fool people 2006-05-04 Scott Granneman's latest column looks at recent security examples where people have been fooled in increasingly innovative ways: from keyloggers used in a massive bank heist and new Trojans that encrypt data and request ransom money, to real financial rip-offs that extend out from online virtual gaming worlds like World of Warcraft. http://www.securityfocus.com/columnists/401 Sendmail and secure design 2006-05-01 Sendmail's wide market share, ancient code base and long vulnerability history make it an interesting example about the need for software to start from a secure design. http://www.securityfocus.com/columnists/400 Forensic felonies 2006-04-24 A new law in Georgia on private investigators extends to computer forensics and computer incident response, meaning that forensics experts who testify in court without a PI license may be committing a felony. http://www.securityfocus.com/columnists/399 Stop the bots 2006-04-18 Botnets are a major source of evil on the Internet, from spam, phishing attacks, virus propagation and denial-of-service attacks to the stealing of financial information and other illegal activity. Does disbanding them raise legal and ethical implications? http://www.securityfocus.com/columnists/398 Virtualization for security 2006-04-12 Scott Granneman gives an overview of the virtualization options for all three major operating system families and looks at the many ways the technology can improve your security posture in an organization or at home. http://www.securityfocus.com/columnists/397 This Means Warcraft! 2006-04-03 A recent World of Warcraft case involved a WoW book by Brian Knopp that was being sold on eBay. It resulted in automated takedown notices by "lawyerbots" and shows how the legal process today can end up silencing legitimate uses of trademarks and copyrights. http://www.securityfocus.com/columnists/396 |
|
Privacy Statement |