• How to get a password? Just ask...

    Network managers are fighting a lonely battle on security with the majority of users and directors carelessly giving their passwords to complete strangers.
    Sometimes it helps if you offer chocolate!

    http://www.computing.co.uk/networkitweek/news/2058275/users-spill-password-beans

    Btw., did you know, that a Windows password could be up to 127 characters long? How long is yours?

    Urs

     

  • Top ten Internet crimes 2006 (Internet Crime Report 2006)

    I really can't believe that there are still people who get trapped by those Nigerian fraud letter...
    Well, did I ever told you that you can win a million just by reading this blog???

    From the management summary of the report:

    Internet auction fraud was by far the most reported offense, comprising 44.9% of referred complaints. Non-delivered merchandise and/or payment accounted for 19.0% of complaints. Check fraud made up 4.9% of complaints. Credit/debit card fraud, computer fraud, confidence fraud, and financial institutions fraud round out the top seven categories of complaints referred to law enforcement during the year.

    Of those individuals who reported a dollar loss, the highest median losses were found among Nigerian letter fraud ($5,100), check fraud ($3,744), and other investment fraud ($2,695) complainants.

    But read the rest for yourself:
    http://www.ic3.gov/media/annualreport/2006_IC3Report.pdf

    Urs

     

  • Computer Forensic Software Tools Downloads

    Software tools that have been found to be useful in forensic examination of recovered evidence.

    http://www.forensic-computing.ltd.uk/tools.htm

    Urs

     

  • Data Encryption Toolkit for Mobile PCs - Security Analysis

    This guide, the Microsoft Data Encryption Toolkit for Mobile PCs Security Analysis, provides specific details about the levels of security that can be achieved using BitLocker and EFS. The Enterprise and Ultimate editions of Windows Vista™ support the full range of security features described in this guide, and a significant and useful subset is available in Microsoft Windows® XP. Several levels of protection are available, depending on the features and configurations applied. In the most secure configurations, a malevolent attacker would require an extraordinary amount of resources to decrypt the data on a hard disk drive.

    The Security Analysis will help you understand how features in Windows Vista and Windows XP help mitigate or reduce specific security risks in your organization. This guide will help you to:

      • Identify common threat vectors and risks in your environment.
      • Understand how to mitigate specific risks and threats by using BitLocker and EFS, individually and in combination.
      • Prepare to mitigate security threats that are not addressed by BitLocker or EFS.
      • Understand selected security features and technology available in Windows Vista.

    The security features discussed in this guide were developed using industry-accepted technologies. For example, the Microsoft implementation of the cryptographic algorithms used for BitLocker and EFS are certified according to the US Federal Government Federal Information Processing Standard (FIPS) 140-1, and the implemented algorithms are all mature. This adherence to industry-accepted technologies is important because some state and national data privacy laws provide exemptions or mitigating factors for organizations that can show they have made good-faith efforts to follow best practices for data security.

    http://www.microsoft.com/technet/security/guidance/clientsecurity/dataencryption/analysis/default.mspx 

    Urs

     

  • NIST Releases Report on Biometrics Advances

    Improved algorithms used in facial recognition software programs have improved the success of such technology by up to ten times since 2002, the National Institute of Standards and Technology (NIST) said in a report,"Face Recognition Vendor Test (FRVT) 2006 and the Iris Challenge Evaluation (ICE) 2006 Large-Scale Results" issued March 29.

    http://www.realtime-itcompliance.com/information_security/2007/04/security_nist_releases_report.htm

    Direct link to report (PDF): http://face.nist.gov/frvt/frvt2006/FRVT2006andICE2006LargeScaleReport.pdf

    Urs