Articles In Security

By Gotham, Posted in Security

Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. Typically, the messages appear to come from well known and trustworthy Web sites. Web sites that are frequently spoofed by phishers include PayPal, eBay, MSN, Yahoo, BestBuy, and America Online. A phishing expedition, like the fishing expedition it's named for, is a speculative venture: the phisher puts the lure hoping to fool at least a f... read more.

  • August 01, 2012

By Ken Phelan, Posted in Security

As an Integrator, I pitch a lot of products to potential customers. I often position these products as solutions, working to find and solve a particular customer need. Based on a mild sense of intellectual and moral integrity, I often worry about whether Gotham is actually solving problems, or just pushing boxes. When discussing a product as a potential solution for a customer, I find that there are generally two types of meetings: The first type of meeting is what I call QVC IT – generally, a present... read more.

  • July 09, 2012

By Gotham, Posted in Security

Vulnerability assessments examine an organization's environment, and identify and quantify vulnerabilities and their potential threats to the organization. A vulnerability assessment is an in-depth evaluation of an organization’s security posture, concentrating on the flaws (configuration, processes, policies, etc.) that cause and allow vulnerabilities to be created in the first place. The value proposition of a vulnerability assessment is an organization's visibility into their internal security controls –... read more.

  • June 25, 2012

By Gotham, Posted in Security

Vulnerability assessments examine an organization's environment, and identify and quantify vulnerabilities and their potential threats to the organization. A vulnerability assessment is an in-depth evaluation of an organization’s security posture, concentrating on the flaws (configuration, processes, policies, etc.) that cause and allow vulnerabilities to be created in the first place. The value proposition of a vulnerability assessment is an organization's visibility into their internal security controls –... read more.

  • June 25, 2012

By Russell D. Vines, Posted in Security

As the recent LinkedIn and eHarmony hacks demonstrate, ignoring security best practices is not just a problem with indie music sites and gaming sites. After six million LinkedIn passwords were hacked and posted to a Russian forum, many security experts were surprised to find out how weakly the company protected the large volumes of data under its care. For one thing, LinkedIn does not have a CSO or CISO with sole responsibility to enforce and test security, unusual for a company of its size. LinkedIn has... read more.

  • June 21, 2012

By Russell D. Vines, Posted in Security

If you connect an unpatched, unprotected Windows PC  to the Internet, how long will it take before it’s infected by malware? The SANS Internet Storm Center recently posted a series of calculators that estimate how long an unpatched system could exist on the Internet before it became infected. Calculating survival time (the average time between reports generated by worms attempting to propagate) has been a security exercise for a long time now, but seems more relevant in the age of totally automated bots... read more.

  • June 20, 2012

By Russell D. Vines, Posted in Security

Highly sophisticated malware has been used to spy on countries, particularly in the Middle East, for at least a couple of years. An advanced worm formally known as Worm.Win32.Flame is just now starting to have a big impact. While its targets are similar to Stuxnet—that is, it appears to be a very focused state-sponsored attack on Middle Eastern countries—its code is written a bit differently from Stuxnet and Duqu, two viruses that were created for government-to-government attacks. For one thing, it’s... read more.

  • June 19, 2012

By Gotham, Posted in Security

From the Citrix eDocs Glossary: A demilitarized zone (DMZ) is a network isolated from the trusted or secure network by a firewall. Network administrators often isolate public resources, such as Web or email servers, in the DMZ to prevent an intruder from attacking the internal network. ... read more.

  • June 13, 2012

By Gotham, Posted in Security

From the Citrix eDocs Glossary: A demilitarized zone (DMZ) is a network isolated from the trusted or secure network by a firewall. Network administrators often isolate public resources, such as Web or email servers, in the DMZ to prevent an intruder from attacking the internal network. ... read more.

  • June 13, 2012

By Russell D. Vines, Posted in Security

If you visit Wikipedia and see ads popping up, you've probably been hit by a specific browser-based infection known as click fraud malware. Although not particularly dangerous, this malware exploits browser extensions to increase affiliate revenue by injecting ads into pages and highjacking search queries. In a blog post on Monday, Wikipedia reminded users that it never runs ads, other than fundraising for Wikipedia itself. The reason it's easier to spot the ads on Wikipedia than it is on other sites is... read more.

  • May 16, 2012