TITLE

Computing insecurity

AUTHOR(S)
Gonsalves, Chris
PUB. DATE
May 2005
SOURCE
eWeek;5/23/2005, Vol. 22 Issue 21, p32
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article focuses on computer security. A computer virus Trojan sits quietly on an infected machine until a user authenticates to an online banking site with a token. The authentication prompts the Trojan to action, where it opens a background session with the user's online banking site, populates a money transfer form and relieves the user of much coin. According to the author, event the most advance security system are vulnerable to virus attacks and hacking. Software timing attacks could expose crypto keys on Intel servers running Hyper-Threading. Also, a popular VPN protocol was found to be vulnerable to a fairly easy exploit, and Microsoft's latest security patching efforts appear flawed. Even grid computers could not get through early May unscathed, with word that a worm could lift SSH user credentials and give away the keys to the on-demand kingdom. Spyware is a hack wrapped in butcher's paper and sealed with a price tag, but it has too many permutations and, more important, too many friends to give way to simple legality.
ACCESSION #
17134869

 

Related Articles

  • Fight next security war. Lundquist, Eric // eWeek;5/23/2005, Vol. 22 Issue 21, p26 

    The article focuses on computer security. According to the author, in the future security will be treated as a service by the internal technology staff or purchased via subscription from an outside provider. The days of piecemeal security upgrades and client to client scrambles are quickly...

  • Today's Attackers Can Find the Needle. Mimoso, Michael S.; Savage, Marcia // Information Security;Jun2006, Vol. 9 Issue 6, p24 

    This article discusses the type of for-profit crime plaguing the Internet. Today's hackers want customer data and intellectual property and they also want to infiltrate government agencies. Stealth technology that are being used by attackers include rootkits which are bundled in spyware. Ways to...

  • An Usage-Centric Botnet Taxonomy. Czosseck, Christian; Podins, Karlis // Proceedings of the European Conference on Information Warfare & ;2011, p65 

    Botnets have been a recognized threat to computer security for several years. On the timeline of malware development, they can be seen as the latest evolutionary step. Criminals have taken advantage of this new technol-ogy and cyber crime has grown to become a serious and sophisticated problem...

  • FIVE CRITICAL ELEMENTS OF SECURITY REMAIN RELEVANT TODAY. Coffee, Peter // Baseline;Aug2007 Supplement, p23 

    The article offers information about the five critical elements of security relative to technology. Some of the viruses that have widely infected millions of computers in the U.S. are elaborated including the Nimda worm, Slammer worm and Sober worm. To improve the security of electronic...

  • Dirty dozen spam-retaying countries.  // Database & Network Journal;Feb2007, Vol. 37 Issue 1, p24 

    The article reports on the top twelve spam-relaying countries identified by Sophos PLC in its Security Threat Report 2007. The U.S. remains to be at the top of the list of worst spam-relaying countries. The other countries included in the spam-relaying statistics are China including Hong Kong,...

  • USB Devices Unveiled.  // Database & Network Journal;Aug2006, Vol. 36 Issue 4, p22 

    The article reports on the condition of universal serial bus (USB) devices, being susceptible to virus. According to the author, reports of the style data theft and comprise are becoming more of threat every day. Once one of the USB devices are plugged in computers, becomes trivial to merely...

  • Coalesce Model to Prevent Format String Attacks. Shekhar, Jayant; Yadav, Seema; Ahmad, Khaleel // International Journal of Computer Science Issues (IJCSI);May2011, Vol. 8 Issue 3, p427 

    Format string attacks cause serious security problems in the field of software security in computer world. Testing and implementation against to Format String vulnerabilities can avoid result due to working of Format String Bugs. In this paper, we have proposed eight novel approaches to prevent...

  • Enterprise Security Strategy. Ali Pabrai, Uday O. // Certification Magazine;Nov2003, Vol. 5 Issue 11, p48 

    Offers tips on implementing an enterprise security strategy. Increase in hacker sophistication and speed of attacks; Ways to counter cyber crimes; Strategic objectives for business security.

  • Surviving Hacker Attacks Proves that Every Cloud Has a SILVER LINING. Cheng, Kirby // Computers in Libraries;Mar2005, Vol. 25 Issue 3, p6 

    This article presents a narrative on how the author dealt with computer hackers. The first hacker attack occurred when I was a new administrator. Late at night, the campus Information Technology (IT) department's network monitoring system detected an unusually high volume of traffic originating...

Share

Read the Article

Courtesy of NEW JERSEY STATE LIBRARY

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics