Traditional authentication mechanisms for online banking have been password and/or a one time password from a dedicated token. Variants or a combination of these two authentication types have been deployed by most banks across the globe. Increasingly these traditional customer authentication methods are being challenged and defeated. Continue reading “Responding to Authentication challenges in Online Banking”
Some Interesting Articles and News collated from the Web – December 9, 2009
- 5 key security trends for the next decade Read more
- AVG”s Internet security threats prediction for 2010 Read more
- Free Wi-Fi network scanner for Windows Read more
- WPA Cracker Offers Online Cloud Cracking Service Read more
- Fake fingerprint fools biometric devices Read more
- NeXpose Community Edition – Our First Look Read more
- Top 10 infected sites from India Read more
- Changes coming to the OWASP Top 10 in 2010 Read more
- Using msfpayload and msfencode from Metasploit 3.3 to bypass anti-virus Read more
- Freeware version of GFI EndPointSecurity Read more
- Tutorial – Alternate Data Streams: The Forgotten Art of Information Hiding Read more
- Bank didn’t notice ATM skimmer for a week Read more
- 5 security threats to watch in 2010 Read more
- Securing SQL server 2008 databases Read more
- Nessus 4.2 Released! Read more
- 10,000 mobile phones a month left in taxis Read more
- Cloud security service looks for malware Read more
- Wireless network detector Kismet 2009-11-R1 released Read more
- IBM to acquire database security start-up Read more
- Sun, ATG unveils cloud-based desktop as a service Read more
Cloud Security
Cloud Security
(This is an extract from the original article appearing in Information Week)
The benefits of cloud computing make it hard to resist for both big and small businesses. However security in the cloud is still a stumbling block for most organisation in considering the adoption of cloud computing.
Securing the Network Printer
Network Printers are so commonly used that they are no longer considered computing accessories but more as office appliances. At first thought, applying security to network printers may seem superfluous and unnecessary. But Printers today are complex network devices that require careful consideration regarding security. Continue reading “Securing the Network Printer”
Checklist to secure data in mobile phones
As per a recent statistic, about a million mobile handsets are getting lost every year. While mobile phones carry valuable data such as business contacts, emails, documents, pictures, videos, etc. and senior management executives are increasingly using their smart phones compared to laptops, securing mobile phones is not given top priority in the IT security agenda of many business organizations. It is highly recommended that every organization includes a ‘Mobile Phone Security Policy’ in their IT Security Policy and Procedures. The policy may include a security checklist similar to the one given below. Continue reading “Checklist to secure data in mobile phones”
Some Interesting Articles and News collated from the Web – November 27, 2009
- Shodan: Another Step Towards Intrusion as a Service Read more
- Cloud computing pros and cons Read more
- Top 5 Firefox add-ons: Security testing and assessmentRead more
- New risk management ISO standardRead more
- Cyberoam launches end point data protection solutionRead more
- India embarks on e-tracking of crime projectRead more
- Cyber terrorism next big threat to India: Cyber security whizkidRead more
- GenApple – First Glance at the First Information BrokerageRead more
- Gartner Identifies the Top 10 Strategic Technologies for 2010Read more
- MicroSourcing offers SMB outsourcing solutionsRead more
- Gartner lays out Top 10 strategic technologiesRead more
- Windows Security Logs and MS Log ParserRead more
- How to Carry Out Successful Cloud Governance and AdoptionRead more
- Newest Zeus = NACHA: The Electronic Payments AssociationRead more
- SaaS based accounting SW attracts Indian SMBsRead more
Are you visiting secured websites?
The increased usage of internet has brought along with it a wide array of security concerns. Just as how a system and its data can get infected by virus, websites can also get infected with Trojans, virus, malware, adware, injection attacks etc. In this article let’s gain an understanding of how to ensure that one visits a secured and safe website. Continue reading “Are you visiting secured websites?”
Virtualization – How you can benefit
Virtualization is a buzzword that has been doing the rounds for a couple of years now. Does it really help organizations and how?
Some Interesting Articles and News collated from the Web – November 19, 2009
- IT (Amendment) Act, 2008 comes into force
- Yokoso! – Web Infrastructure Fingerprinting & Delivery Tool
- Startup mantras from NASSCOM
- Top 10 Internet moments of the decade
- Micro loans bring light to rural poor
- Chip and PIN adoption serves lesson for U.S. payment industry
- Cloud computing: Benefits and risks
- Nessus vs Retina – Vulnerability Scanning Tools Evaluation
- Top Ten Email Related Disasters of 2009
- RATS – Rough Auditing Tool for Security
- Bank IT Worker Charged In $1.1 Million Fraud
- Make Your Own Business Cards
- Increase Thundebird’s Mass Mailing Capabilities
- Paint.net 3.5 Final
- Digital Forensics Framework – A Perspective Forensics Tool
- How Jindal Poly Films Fought Internet Threats
- Risk Assessment Framework Helps Bank Secure Apps
- Cain & Abel v4.9.35 – Password Sniffer, Cracker and Brute-Forcing Tool
- I Bought an ATM off Craigslist for $750 w/1000 CC#s on it
- Analysis of Windows Security Logs with MS Log Parser
Endpoint Security – What is the fuss all about?
In recent months, there is a lot of buzz about Endpoint Security. So what is Endpoint Security … and why the fuss?
End point security is an IT security concept that makes each device (end point) responsible for its own security. Endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed.
Continue reading “Endpoint Security – What is the fuss all about?”
