Interesting Information Security Bits for 10/02/2008

October 2, 2008

Good afternoon everybody! I hope your day is going well.
Here are today’s Interesting Information Security Bits from around the web.

  1. Outpost24’s TCP DOS Attack Explained
    Fyodor has posted his opinion of what the new TCP based DOS attack we have been hearing so much about recently. Regardless of whether he is bang on in his guess, you really ought to go read hi note.Hat tip: @dryden1
  2. The Concise Guide to Proxies
    Lori gives a real straight forward and complete description of the different types of proxies. Good one to keep in the “when someone asks a questions” folder.
  3. 2008 Data Breach Investigations Supplemental Report
    Verizon has released its 2008 Data Breach Investigations Report that focuses on four major industy groups. Check it out. I still have to read it so can’t offer first hand opinion yet.
  4. A Peek Inside A Simple ATM Machine
    Ax0n shares some interesting inforomation with us about an ATM machine’s physical and mechanical feathers.
  5. All About Windows Update – Security Watch
    A pointer to a document published by Microsoft that explains how Windows Update works. Very concise and well put together. It is written in Word 2007, so you will need the comptability pack if you aren’t there yet.
  6. Surveillance of Skype messages found in China – International Herald Tribune
    If you are using skype while in China, you may be talking to more people than you anticipate.
  7. Cisco survey: Cultural differences can complicate IT security when work goes offshore
    Different cultures with different levels of information security awareness and maturity can significantly impact you company. You must make sure your plans take that into account when you start globalizing your company.

That’s it for today. Have fun!
Kevin

Advertisements

The best anti-malware software out there…

October 2, 2008

Now that I have made such a bold statement, let me back off a little and admit that I don’t know what anti-malware software is the best.  What I do know is that we can actually leverage a behavior that a lot of malware exhibits. “What behavior is that?” you ask.  Well, I’ll tell you.

My primary machine at home, the one that has “important stuff” on it, is a virtual machine that runs on my main server.  What type of environment does more and more malware not run in? Yup, a virtual one.

So, there you go, install a lightweight Linux OS with a virtualization platform or something thing VMWare ESXi and then load your daily OS on top of that.  Wah la! Best anti-malware software == malware itself.

Of course, I am not saying you have nothing to worry about with type of configuration. There is a whole host (pun intended) of issues that need to be dealt with and, of course, not all malware is quite this accomodating.  But it did make me stop and go hmmm.

What do you think?

Kevin