June 2007

  • cypherpunk

    Cypherpunk, a term that appeared in Eric Hughes' "A Cypherpunk's Manifesto" in 1993, combines the ideas of cyberpunk, the spirit of individualism in cyberspace, with the use of strong encryption (c...

  • cyberstalking

    Cyberstalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or a discussion group.

  • cookie poisoning

    On the Web, cookie poisoning is the modification of a cookie (personal information in a Web user's computer) by an attacker to gain unauthorized information about the user for purposes such as iden...

  • black hat

    Black hat is used to describe a hacker (or, if you prefer, cracker) who breaks into a computer system or network with malicious intent.

  • back door

    A back door is a means of access to a computer program that bypasses security mechanisms.

  • Report: New hacking technique shields attackers

    A new report issued by UK-based security vendor Finjan shows that attackers are using IP addresses to mask a malicious Web page and avoid detection.

  • Gartner: Making the case for enterprise security architectures

    Gartner IT Security Summit: An enterprise security architecture is an important part of a long term strategy and can help mitigate the risks when data is used in new ways.

  • What are the best security practices for securing sensitive data on PDAs?

    In this SearchSecurity.com Q&A, identity management and access control expert Joel Dubin discusses several ways of securing sensitive data on PDAs, such as establishing an acceptable use policy and...

  • Is there any policy or regulation to help protect biometric data?

    In this SearchSecurity.com Q&A, identity management and access control expert Joel Dubin examines how authentication credentials, such as biometric data, are in need of more protection from current...

  • Life at the edge: Securing the network perimeter

    Learn strategies for securing the network perimeter to resist attacks.

  • What are the potential risks of giving remote access to a third-party service provider?

    In this SearchSecurity.com Q&A, identity management and access control expert Joel Dubin discusses the potential risks involved with providing remote access to a third-party service provider.

  • Should void user IDs be preserved in an audit history?

    In this SearchSecurity.com Q&A, identity management and access control expert Joel Dubin explains how inadequate management of user access can result in compliance violations and information securi...

  • Zero-day flaws affect Firefox, IE

    A researcher published details on four new zero-day flaws affecting Firefox and Internet Explorer. They could be exploited to log keystrokes, download malware and steal cookies.

  • What challenges arise when designing a logging mechanism for peer-to-peer networks?

    In this SearchSecurity.com Q&A, identity management and access control expert Joel Dubin discusses how to track a peer-to-peer network by using open source security tools.

  • Testing security of apps could put pressure on vendors

    Gartner IT Security Summit: Companies should shoulder some of the responsibility for testing applications to put pressure on vendors to create more secure software, say panelists.

  • van Eck phreaking

    Van Eck phreaking is a form of eavesdropping in which special equipment is used to pick up telecommunication signals or data within a computer device by monitoring and picking up the electromagneti...

  • spam trap

    A spam trap is the inclusion of an option in an online form that is preselected by default with the expectation that the user will fail to notice the option.

  • spoof

    Spoof was a game involving trickery and nonsense that was invented by an English comedian, Arthur Roberts, prior to 1884, when it is recorded as having been "revived.

  • TACACS (Terminal Access Controller Access Control System)

    TACACS (Terminal Access Controller Access Control System) is an older authentication protocol common to UNIX networks that allows a remote access server to forward a user's logon password to an aut...

  • user profile

    In a Windows environment, a user profile is a record of user-specific data that define the user's working environment.