Thursday, May 17, 2007

LAN test plan

i got the paper

Wireless test vendor VeriWave has released a "master test plan" to guide enterprises in testing wireless LAN gear for performance, behaviors and characteristics.

The 190-page free downloadable document is designed to help network administrators know what to test in order to verify their equipment purchase decisions, according to the Portland, Ore., vendor.

 blog it

Wednesday, May 16, 2007

Incident management in the age of compliance

The basics of doing what the laws tell you to do

Security incidents can wreak catastrophic results on organizations. Such incidents may involve hacking, malware outbreaks, economic espionage, intellectual property theft or loss, network access abuse, theft of IT resources, or many other issues.  Recent regulatory mandates directly affect how organizations should deal with such occurrences.

The well-known security maxim, "prevention-detection-response," covers three components, all crucially important for an organization’s security posture.  "Prevention" seems favored by many as the primary component with "detection" following close behind.  However, "response" has a unique characteristic lacking in the other two components: it is impossible to avoid.  While it is not uncommon for an organization to have weak prevention and nearly non-existent detection capabilities, response will always be present, since organizations are forced into response mode by attackers.

 blog it

Tuesday, May 15, 2007

Computer Forensics Catches a Criminal

Self-promotional article, but still an interesting read
clipped from www.law.com

In the case of U.S. v. Duronio, the bomb was the standard Unix remove command hidden amongst other legitimate commands. The payload was triggered in such a way that it would delete all of the files on the important stock trading servers on the morning of March 4, 2002, which in turn would render them useless to UBS-PW employees and stock traders.
 blog it

Saturday, May 12, 2007

Silica hacking device

SAN FRANCISCO — The palm-sized PDA tucked away in Justine Aitel's pocketbook just might be the most scary device on display at this year's RSA security conference.

more...

Sunday, May 6, 2007

A 13B company with weak security

clipped from www.cgisecurity.com

"A wireless network that employed less protection than many people use on their home systems appears to be the weak link that led TJX Companies, the US-based retailing empire, to preside over the world's biggest known theft of credit-card numbers.

Despite a market capitalization of almost $13bn, it appears the company couldn't afford to secure its Wi-Fi network with anything more robust than the woefully inadequate Wired Equivalent Privacy protocol.

According to a front-page article in today's Wall Street Journal, the nonfeasance allowed hackers to use a simple telescope-shaped antenna and a laptop to intercept data flowing through a Wi-Fi network used at a Marshalls discount clothing store near St. Paul, Minnesota."
 blog it

Friday, May 4, 2007

Scapy

clipped from www.secdev.org

Scapy is a powerful interactive packet manipulation program. It is able to forge
or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and
replies, and much more. It can easily handle most classical tasks like
scanning, tracerouting, probing, unit tests, attacks or network discovery (it can replace
hping, 85% of nmap, arpspoof, arp-sk, arping, tcpdump, tethereal, p0f, etc.).
It also performs
very well at a lot of other specific tasks that most other tools can't handle,
like sending invalid frames, injecting your own 802.11 frames,
combining technics (VLAN hopping+ARP cache poisoning, VOIP decoding on
WEP encrypted channel, ...), etc.
 powered by clipmarksblog it

Wednesday, May 2, 2007

UHY Advisors

If we go strong, these guys will get in touch
clipped from www.sys-con.com


The lab is unique for its flexibility to be used for both high-volume
electronic data discovery -- including data processing, culling with search
terms, de-duplication and file conversion -- and complex digital forensics
activities. The facility is secured with biometric locks and the evidence
storage "vault" is also secured with advanced motion detectors.

HOUSTON, TX -- (MARKET WIRE) -- 05/02/07 -- UHY Advisors today announced the opening of its
newly constructed electronic data discovery lab, a state-of-the-art
facility for processing large volumes of electronic evidence and conducting
sophisticated computer forensics investigations, at a secure location in
downtown Houston.

powered by clipmarksblog it

Tuesday, May 1, 2007

Security tool for federal agencies

can individuals get it?

May 01, 2007 (Computerworld) -- The Center for Internet Security (CIS) this summer will release a free tool designed to help federal agencies check whether their Windows systems configurations comply with security requirements mandated recently by the White House's Office of Management and Budget.

 powered by clipmarksblog it

Building a semi-custom eDiscovery solution

How about a customizable solution like Google domains?
clipped from www.law.com
INEFFICIENCIES IN TODAY'S E-DISCOVERY PROCESS
Because of an expanding caseload, we needed to integrate a variety of media -- including paper and electronic files --
into a centralized management system. Each person on the case also required up-to-date information on case schedules,
correspondence completed or needed, and
 powered by clipmarksblog it