Category Archives: Week 18

Personal Data Compromised for 4k in San Juan School District

4000 San JuanUnifiedSchool Districtemployees social security numbers were exposed on the internet. One employee googled information about himself and found his social security number on a church website. After investigation was found that one employee that worked in human resource … Continue reading

Posted in IT Security, Week 18 | Leave a comment

Beer drinking and deep confidentiality

Beer drinking and deep confidentiality may sound like two opposing arguments, but in reality there is a project under way with hooligan registrations using “Secure Multiparty computation”, or SMC for short. in-depth explanation of SMC (in danish)

Posted in IT Security, Week 18 | 2 Comments

Soon does Gmail not work for every fifth Internet user

If you use Internet Explorer 7, Firefox 3.5 or Safari 3 , Google applications like Gmail and Google Docs is not longer could be used after first August 2011. The reason is that Google will take advantage of the many … Continue reading

Posted in Week 18 | Leave a comment

better ways to weed out spammers than CAPTCHA

CAPTCHA is a inevitable thing for each site. I didnt understand why i should pass the CAPTCHA before posting something or doing something on internet. Until I read this artical and get a further understanding.The purpose is distinguishing between machine and people. … Continue reading

Posted in IT Security, Week 18 | 4 Comments

Phishing at Sony

I chose this topic, because nowadays lots of peoples are using internet banking, and newer know when they are using true or false web site. That was happened for big internet (not only internet) shop Sony. The Finnish company F-Secure, which makes … Continue reading

Posted in IT Security, Week 18 | Leave a comment

ARP poisoning

What is it? ARP poisoning is a technique in which a host in a LAN can “poison” the ARP table of another host causing it to send packets to the wrong destination. The attacker can modify the traffic in the network such … Continue reading

Posted in IT Security, Week 18 | Leave a comment

Common security practices

In reference with my previous post about destructive behaviour in networking I’m writing this one just to put out there some steps and advices you can take in order to secure your network as much as possible. Lessons Learned From looking … Continue reading

Posted in IT Security, Week 18 | Leave a comment