Archives

Retailer Wireless Devices Largely Unprotected

A new survey shows 44 percent of the wireless devices used by retailers are vulnerable to attacks by data thieves. And that’s the good news. A year ago, the same Motorola survey showed 85 percent of retailers were sitting targets for drive-by data attacks. New PCI standards phasing out Wireless Equivalent Protocol–the weakest form of encryption this side of no encryption at all–may hold the key to improved retailer wireless security.

Firefox Plug-in Lets Users Import Google Notebook to Zoho

Messaging and collaboration SAAS company Zoho updates its Firefox plug-in for Zoho Notebook to make it easy to import a Google Notebook to Zoho’s cloud computing environment. The move is a shrewd one on the part of Zoho, which is looking to find favor with peeved Google users put off by Google Notebook’s newly halted application development. Any content added to the new Zoho plug-in will be automatically synchronized with the online version of Zoho Notebook.

Whois Abuse Still Out of Control

It’s still easy to try to steal an identity with false whois information. There are rules against it and ICANN pretends to enforce them, but I personally know that it doesn’t really happen.

SSL Crack Shows You Must Advance Your Security

The successful creation of a rogue certificate authority by security researchers using a colliding certificates attack demonstrates that if you’re not moving forward with your security-related standards then you’re moving backward. Everything gets cracked over time, so you have to keep improving your defenses.

#TrustOpen Red Hat