TechTarget ANZ's slightly skewed look at this weeks news.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Sometimes you've got to wonder about just how much people want to prove Bill Gates wrong. The Microsoft Chairman has been staring down the world over the last week with bold challenges to anyone brave enough to crack Windows Vista's security.
So along comes someone's bright idea to somehow turn on Vista's speech recognition features and then play the computer an audio file that tells it to lower the drawbridge so that the forces of evil can find their way inside.
Turns out the attack will work, if about a thousand other variables all fall into place.
So take that, Bill!
But also take that, you! Plenty of this kind of stuff is really quackery, dreamed up by folks who want some short term attention when the media is particularly interested in one topic or another.
For example, a couple of weeks back we noticed that RSA was distributing a rather alarmist media release well after the threat it described had been denied, discredited and dispelled. When we asked them why they persisted when they should have known their approach was based on old and inaccurate information, they suddenly went all quiet...
This is not to say that security is something to take lightly. The opposite is plainly the case.
But sometimes we wonder whether it is sensible to take every piece of news about security risks seriously.
Things we would like you to read this week
Seven security nasties and how to defeat them: Our series on seven security nasties is nearly over. Here's links to the first six instalments, and check out searchsecurity.com.au on Friday February 9th for the last exciting chapter!
- Network-based attacks
- Information theft and crypto attacks
- Application-specific attacks
- Social Engineering
- Physical security
Data horses for disk courses
Ever wanted to know how to match data and disks? Read on to learn how to do it well.
Stackick up network security
True professionals can recite the layers of the OSI model backwards, forwards and some other ways too. Professionals that want to secure the stack will read our new layer-by-layer guide.
Coming soon...Next week on TechTarget
- Everything you could ever want to know about unified storage
- Our new guide to Web application security
- Do you really need new management tools to make VoIP work on your existing network?
Web site of the week...
Next time you unpack a whole lot of new equipment and start to wonder just how to recycle the boxes, visit pdaddy.wordpress.com where you will learn how a mate of ours is building a cubbyhouse for his kids.
His raw materials? Ten Dell server boxes that he found at work. He's laminating them with extreme cunning into what looks like a very cool cubbyhouse.
Oh and what he knows about cardboard could now fill a book.
Contact us -- Every email sent to email@example.com is read by a real human!