Pages: 1 ... 3 4 5 6 7 8 ...9 ...10 11 13 14

  2007-04-05

DHS wants DNSSEC keys -- so what?

  21:43, by Hagai Bar-El   , 369 words
Categories: Security Policies
The Department of Homeland Security (DHS) wants to have the root master keys of DNSSEC. This will allow them to fake DNS responses at will. Read all about it at: Homeland Security grabs for net's master keys Department of Homeland and Security wants… more »

  2007-01-06

Is more security always better?

  21:41, by Hagai Bar-El   , 932 words
Categories: Security Policies
This depends on who you ask. Some people think that the more secure a system is, the better; with no exceptions. This school of thought is often attributed to product vendors. This approach helps them believe (and thus convince) that their product is a… more »

  2006-09-11

PDAs in highly classified environments

  21:40, by Hagai Bar-El   , 820 words
Categories: IT Security
For a while IT security professionals are warning against the impacts of Personal Digital Assistants (PDAs) on corporate security. A PDA can be lost or stolen and lead to undesired disclosure of the information that is on it. The emerging of… more »

  2006-07-28

The toughest part of designing secure products

  21:37, by Hagai Bar-El   , 928 words
Categories: Security Engineering
It is already obvious that security is hard to do right. Bruce Schneier has written a good essay called: Why Cryptography Is Harder Than It Looks. This essay refers to cryptography, but touches on the subject as a whole. It is still not always clear,… more »

  2006-05-07

Is E-mail encryption really too complex?

  21:32, by Hagai Bar-El   , 567 words
Categories: IT Security
Every once in a while we read yet another article revealing the level to which e-mail encryption is uncommon. The last one I saw is here. Whenever the debate is raised about how come e-mail encryption is so seldom used, we hear the common opinion that… more »

  2005-11-12

Evaluating Commercial Counter-Forensic Tools

  21:30, by Hagai Bar-El   , 548 words
Categories: IT Security, Sources
I have just enjoyed reading "Evaluating Commercial Counter-Forensic Tools" by Matthew Geiger from Carnegie Mellon University. The paper presents failures in commercially-available applications that offer covering the user's tracks. These applications… more »

  2005-10-24

Anonymity -- great technology but hardly used

  21:27, by Hagai Bar-El   , 581 words
Categories: IT Security
It's hard not to appreciate the long way we did in studying anonymity and pseudonymity. We know a lot and can do a lot. Each time I read on a zero-knowledge scheme or on another untraceable digital cash I am amazed by the amount of knowledge that the… more »

1 ... 3 4 5 6 7 8 ...9 ...10 11 13 14