Monthly Archives: April 2011

Talking Points

Image via Wikipedia Talking Points Plenty of stuffs this week, as usual, we cannot start without talking about the Royal Wedding Today is the day, the royal wedding is coming and everyone is so excited that can’t stop himself from opening any email, link, search result or whatever related to the biggest event in human history .Ok may be a little too much but for sure the royal wedding event is moving tons of gadget, interest and cybercriminal activities online but how could not expect something like this, where media are so deeply involved?as a matter of fact several security…

Spear Phishing: can it fool me?

Image via Wikipedia Recent articles in the news remind me that anyone can be fooled by a good scam. the problem is always the trust we gave to the communication we received. is not just a financial problem (you remember the Madoff scam?) but a problem that can hit anyone, even expert guys can fall.The most recent was the hack occurs at Oak Ridge National Laboratory, but it is just the last of an infinite series. Also the RSA securID breach  was prepared with spear phishing. What is spear phishing? Spear phishing is an e-mail spoofing fraud attempt that targets…

Is it a Malware epidemic or Just marketing?

the changing face of the security landscape those days can be perceived mostly from security vendors reports and news article than from a real understanding of what has changed and what is going to change in the security landscape from security people.In the enterprise environment there are still the old fashioned procedures and the overall approach upon security needs is quite dated.But to be able to understand what we need to change and why we need to change our approach would be useful to understand what are all those changes about. Once upon a time there was a cable When…

TCP Split Handshake Issue

Image via WikipediaTCP Split Handshake Issue those days I’ve read on the news a lot of noise about an NSS test that were reporting a TCP handshake security hole (TCP Split Handshake Issue) in several commercial firewalls. The question is interesting from several points of view: are IPS and firewall really secure? is a vulnerability really a security issue? how does this vulnerability affect me? http://portadiferro.blogspot.com/2011/04/tcp-split-handshake-issue.html Related articles Other Considerations On TCP Split Handshake (paulsparrows.wordpress.com) TCP Split Handshake: Why Cisco ASA is not susceptible (paulsparrows.wordpress.com) TCP Split Handshake: The (Never)ending Story… (paulsparrows.wordpress.com) TCP Split Handshake Attack Explained (paulsparrows.wordpress.com) Hacker ‘handshake’…

Securing IPv6

Image via Wikipedia In this post, we’ll talk about some of the things to consider when securing IPv6 compared to IPv4. Before digging into this topic, however, it is important to remember that while IPv6 may have different security concerns than IPv4, it is not necessarily any more secure than IPv4. Furthermore, the post will focus on those aspects that are different or unique to IPv6, since many of the common best practices for IPv4 networks also apply to IPv6 networks. View article… Related articles Securing IPv6 (blogs.cisco.com) Adventures in IPv6: Reliability and privacy concerns (bens.me.uk) IPv6 versus NAT (and…

Posts navigation