Pages: 1 ... 3 4 5 6 7 ...8 ... 10 ...12 ...13 14

  2010-11-05

Recommended Podcast: Security Now

  22:43, by Hagai Bar-El   , 307 words
Categories: Sources
There are many IT security podcasts out there; too many, perhaps. Certainly too many to listen to. The challenge is to decide on which ones to follow on a regular basis. I became aware of a good candidate a couple of years ago, and since it retained its… more »

  2010-10-28

Preventing the Evil Maid Attack on FDE

  22:33, by Hagai Bar-El   , 467 words
Categories: IT Security
The attack referred to as the ”Evil Maid Attack”, or the “Cleaning Maid Attack” against full disk encryption (FDE), is considered as one of the serious attacks concerning people who travel with laptops full of confidential information. This attack… more »

  2010-10-22

The Inevitable Collapse of the Certificate Model

  22:30, by Hagai Bar-El   , 755 words
Categories: IT Security, Counter-media
Many had high expectations from the SSL/TLS certificate model. At least on paper it sounded promising and worthwhile. Keys are used to protect traffic; for this to be effective, keys shall be bound to business entities; for the binding to be trustworthy… more »

  2010-08-24

Understanding the security risk of SaaS

  22:29, by Hagai Bar-El   , 745 words
Categories: IT Security, Counter-media
Software as a Service (SaaS) is one of the hot trends in Information Technologies. “SaaS” is the name given to the concept of having applications run on the infrastructure of the service provider, rendering service to the customer over the net. The… more »

  2010-05-19

Automobile hack: we should have known better

  22:28, by Hagai Bar-El   , 776 words
Categories: Security Engineering, Counter-media
No one in the automotive security industry could miss the recently published news article titled “Beware of Hackers Controlling Your Automobile”, published here, and a similar essay titled “Car hackers can kill brakes, engine, and more”, which can be… more »

  2010-03-24

InZero provides some security

  22:25, by Hagai Bar-El   , 826 words
Categories: IT Security, Counter-media
I was just made aware of InZero, a new physical device that you connect to your PC, and your browsing becomes secure. I find it amazing that some people treat it as among the most revolutionary of security solutions. I think the InZero device is cool.… more »

  2009-09-02

A business model based on people making bad security trade-offs

  22:24, by Hagai Bar-El   , 483 words
Categories: IT Security, Counter-media
From time to time I am exposed to a new service, sometimes security-related, that promises something new. More often than not, the new security service is novel, but only because either no one really needs it, or because it does not form a good balance… more »

1 ... 3 4 5 6 7 ...8 ... 10 ...12 ...13 14