Tuesday, March 25, 2008

Intel Researching New Approach to Laptop Security

http://www.darkreading.com/document.asp?doc_id=149076&f_src=darkreading_default



software approach to analysing users usage on laptops

How Real is the threat from Web based Malware?

http://www.sophos.com/security/blog/2008/03/1202.html?_log_from=rss



data from blog



1 in every 206 page requests (0.48%) were blocked as being either a medium or high risk.


1 in every 465 page requests (0.22%) were high risk.


1 in every 766 page requests (0.13%) were sites known to be hosting malware.

glossary of spam terms

taken from sophos blog



http://www.sophos.com/security/spam-glossary.html#mousetrapping

Sunday, March 23, 2008

SNORT version 3

http://www.darkreading.com/document.asp?doc_id=148901&f_src=darkreading_default



new version of snort, supposedly self learning of network environment

Dual factor authentication solution

http://www.darkreading.com/document.asp?doc_id=148946&f_src=darkreading_default



Dual factor authentication tokens in US Treasury department. Low cost and disability aware

Taken from article

http://www.symantec.com/enterprise/security_response/weblog/2008/03/another_reason_why_microsoft_s.html


Microsoft's list of 'bad' file types

List of 'bad' Microsoft file types that attachment manager would normally block



Bad file types

 
Copyright 2009 Security Monkey. Powered by Blogger Blogger Templates create by Deluxe Templates. Sponsored by: Website Templates | Premium Themes. Distributed by: blog template