Pages: 1 ... 3 4 5 6 7 8 ...9 ...10 11 12 14

  2005-06-04

Trojan-Horse Espionage in Israel -- A Tip of an Iceberg

  21:22, by Hagai Bar-El   , 661 words
Categories: IT Security
About one week ago, a serious commercial espionage system was discovered in Israel. For years, several large-scale companies in Israel enjoyed inside information about their competitors using private investigators who were using a Trojan horse… more »

  2005-05-14

Watermarking for DRM? Maybe one day

  21:16, by Hagai Bar-El   , 228 words
Categories: Security Engineering
One of the biggest hurdles of DRM results is that content can somehow be leaked by a few skilled individuals and then find itself on the peer-to-peer networks again. The only way to mitigate this threat is by embedding a watermark on the plain content d… more »

  2005-04-29

Open Source Disk Encryption

  01:11, by Hagai Bar-El   , 163 words
Categories: IT Security, Products
About two months ago I was delighted to see the new version of what I consider to be the first open source drive encryption program for Win32. It's name is TrueCrypt, and it provides functionality that resembles that of DriveCrypt from SecurStar. more »

  2005-02-28

Worms Using Search Engines

  21:11, by Hagai Bar-El   , 357 words
Categories: IT Security
Check out this news item: Latest Mydoom shows hackers using search engines for attacks It's about Internet based worms making use of search engines to spread out. In the examples presented the worms search Google, Lycos, etc., for e-mail addresses and… more »

1 ... 3 4 5 6 7 8 ...9 ...10 11 12 14