Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

Tag Archives: Phishing

Passwords – Once Again, Encore Une Fois, Noch Einmal …

– Not again. Yes, again. Randall Stross is beating the password drum again … and again … and again. I thought that he had put the matter to rest (see my November 24, 3008 column “Passwords – Déjà Vu All Over Again” and my October 4, 2010 column “Passwords … Here We Go…

Passwords … Here We Go Again, Again

– In “A Strong Password Isn’t the Strongest Security” (The New York Times, Digital Domain, September 5, 2010), Randall Stross rightly points out the fallacy of “strong” passwords, which are “changed constantly.” Mr. Stross goes on to describe a method developed by Microsoft researchers…

Busting Password Myths

– I appreciate Richard’s comments on my March 9, 2009 column “Are Passwords Greener?” and agree with him that the “invisible” authentication methods are perhaps the most appealing from a green perspective, assuming that you have at hand whatever device incorporates the…

Save The Whales

– By now we all familiar with Phishing, which is the attempt to extract valuable information from an unsuspecting user via some form of social engineering which is usually done via E-Mail but can also be done via telephone (called Vishing.) In the case of an individual, the target is usually…

Attack Vectors Through the Pragmatic Use of Steganography

– The BBC reports that Fujitsu has discovered pragmatic uses for steganography. Unfortunately, by redirecting the mobile phone’s browser automatically, this could lead to using these images as attack vectors. Here are some quotes from the BBC report: “The key is to take the yellow hue in…