March 2010 Archives

Battery Charger Beats Security

| No Comments | No TrackBacks
| More
News has emerged from US-CERT that a USB battery charger (specifically the Energizer DUO) carries with it a trojan, buried in the Windows application that can be used to monitor the charger status. Apparently the backdoor enables remote system access.

This just goes to show the importance of checking *ALL* code for security vulnerabilities, no matter how innocuous it may seem. The advent of software-as-a-service on demand code scanning services makes this easier than ever before, and something well worth checking out.

Nigel Stanley
Practice Leader - Security, Bloor Research

The Business Case for Database Activity Monitoring?

| No Comments | No TrackBacks
| More

Database activity monitoring is starting to attract even more attention, as privileged insiders such as database administrators can pose a significant risk to customer and proprietary data if allowed to act unchecked. Plus new applications and application services have created more entry points for outside attackers.

Database activity monitoring (DAM) is a technology that tracks and correlates database usage and reports back in the event of an anomaly.

Interested? This webinar may be of use.

Nigel Stanley
Practice Leader - Security, Bloor Research

Find recent content on the main index or look in the archives to find all content.

-- Advertisement --