An independent test and evaluation of 15 different network intrusion-protection system products from seven vendors showed none were fully effective in warding off attacks against Microsoft, Adobe and other programs. NSS Labs, which conducted the test without vendor sponsorship of any kind, also evaluated the 15 network IPS offerings for their capability in responding to “evasions,” attacks delivered in an obfuscated and stealthy manner in order to hide. In that arena, Juniper Networks and TippingPoint didn’t perform particularly well. Juniper IPS scored lowest at only 17% effectiveness. In that arena, the McAfee and IBM IPS held up particularly well.
Not many people seem to have noticed that Invisiblethings team has reported the 3rd attack against SMM (Attacking SMM Memory via Intel® CPU Cache Poisoning) which they have found in the last 10 months. Joanna Rutkowska, founder and CEO of … Continued
If you want to monitor some area, office, room, you should visit this web site. Company 123 CCTV offers security camera surveillance equipment and various accessories (switchers & multiplexers, CCTV monitors, pan, tilt & zoom equipment, wireless trans. & receivers, … Continued
Seems interesting if it is true – Tutorial: “Unlock” your iPhone with SuperSim – Hackint0sh.
IEEE Security and Privacy, issue July/August 2007 (Vol. 5, No. 4), has interesting article Encryption: Security Considerations for Portable Media Devices (subscription required). Abstract With the proliferation of removable media devices, such as iPods and USB drives, large amounts of an … Continued
This, recently updated page, is an index of password recovery procedures for Cisco products. For security reasons, the password recovery procedures listed, require physical access to the equipment. See: Cisco – Password Recovery Procedures.
There is news that the copy protection technology used by Blu-ray discs has been cracked by the same hacker who broke the DRM technology of rival HD DVD discs last month. The coder known as muslix64 used much the same … Continued
Try to answer some of questions bellow: Do you have backup of data on your laptop? Are files on your laptop encrypted? Do you have biometric security on your laptop and do you use it? Are you careful when logging … Continued
A “trusted computing” module (TPM) was found in Intel-based Apple computers, but the reason for it is unknown. Amit Singh, a member of Google’s technical staff, discusses the existence of the chip in his book, “Mac OS X Internals: A … Continued