Pages: 1 ... 3 4 5 6 7 8 ...9 ...10 11 12 14


Open Source Disk Encryption

  01:11, by Hagai Bar-El   , 163 words
Categories: IT Security, Products

About two months ago I was delighted to see the new version of what I consider to be the first open source drive encryption program for Win32. It's name is TrueCrypt, and it provides functionality that resembles that of DriveCrypt from SecurStar.

Full story »

 PermalinkLeave a comment »


Worms Using Search Engines

  21:11, by Hagai Bar-El   , 357 words
Categories: IT Security

Check out this news item:

Latest Mydoom shows hackers using search engines for attacks

It's about Internet based worms making use of search engines to spread out. In the examples presented the worms search Google, Lycos, etc., for e-mail addresses and for vulnerable machines to hop to using specially-crafted search strings.

I was not aware of this trend of worms before so I agree it's new. Yet, I don't agree with any fear associated with this new brand of worms. These worms are somewhat novel in their approach. Yet, I think this approach is better for us (the good guys) rather than worse.

Full story »

1 ... 3 4 5 6 7 8 ...9 ...10 11 12 14