Posted in Security Architecture on Jan 30th, 2008
In todays newspaper there was an article regarding a fraud attempt using a remote access device physical connected to the computer. Thanks to a resourceful employee the attempt failed. This still opens up for questions regarding where you have your boundries for your trusted computing base. Could you trust your clients anymore when they have […]
Read Full Post »
Posted in Security Architecture on Jan 27th, 2008
During the last weeks there have been reports of several sites beeing hacked and having lost their account database and all personal information. Today there was an article in a swedish newspaper of a site adminstering a discount card for about 1 000 000 students. Lets take a look at the information that was lost. […]
Read Full Post »
Posted in Security Architecture on Jan 25th, 2008
There is a rather mean and hard to detect infection spreading on different linux servers. Finjan have released a pressrelease regarding this issue. One thing that it states is that the infecton constatly renames and changes itself to keep it from detection of anti-malware applications. It have been known for quite some time that the […]
Read Full Post »
Posted in Security Architecture on Jan 13th, 2008
In the last days an interesting story has been published in a swedish newspaper regarding a site that has been hacked and lost the whole account database. A lot of passwords and connected emailadresses was later posted in a forum and that was when the bad things started to happend. In a following article a […]
Read Full Post »