Monday, October 4, 2010
Is Comcast helping fake-AV criminals?
http://www.sophos.com/blogs/chetw/g/2010/10/04/comcast-provide-opportunities-fake-av/
Thursday, September 23, 2010
Important: ASP.NET Security Vulnerability
This vulnerability exists in all versions of ASP.NET and will effect web based applications.
Scott Guthrie from Microsoft has written a good blog about this vulnerability here, including a FAQ here
Sunday, August 8, 2010
HIPAA Compliance with Privacy and Security Rules
The Health Insurance Portability and Accountability Act (HIPAA) of 1996 allow the federal government to mandate the ways in which health care organizations store and transmit individuals’ personal health information.
Your Information technology (IT) partner should understand how The Privacy Rule and The Security Rule effect implemented systems and software.
The Privacy Rule
The Privacy Rule establishes minimum Federal standards for safeguarding the privacy of individually identifiable health information.
Health plans, health care clearing houses, and certain health care providers my comply with this Rule.
Individuals are given certain rights by the Privacy Rule including access to health information records and when certain types of health information is shared with other people and organizations.
The Security Rule
Companies who are covered by HIPPA are also required to take specific steps to protect Electronic PHI (ePHI).
All security requirements can be defined as one of three basic safeguards:
- administrative physical technical
Basic requirements include
- Adopting policies and procedures to protect ePHIAdopting policies and procedures to protect the security of patient information, including a policy on workstation useDeveloping and implementing data access control proceduresImplement technical mechanisms to prevent unauthorized accessEstablish a reporting and response system for confidentiality violations
The HIPAA Privacy and Security Rule requirements are designed to be technology neutral and scalable from the smallest to the largest companies and organizations. It is typically a custom combination of software and process which allows companies to be in compliance with the requirements of the Privacy and Security Rules.
I'll follow-up with another article describing more
Wednesday, January 20, 2010
2009 Annual Report on Computer Security
Bottom line: It is pretty scary reading. 2009 was, without a doubt, a record-setting year for the creation of new threats and security issues. Cyber-criminals have become much better at making money from their malware and avoiding detection.
To read the report makes you feel that there is no way to be a user of computers safely these days. That isn't true (yet) but new solutions and security approaches are required as new threats are created. The amount of money made from malware in 2009 was more than any previous year so it is safe to safe that we will be seeing more of the same in 2010 and beyond.
Here are some highlights of the report:
- 25 million new strains of malware were identified in just one year, compared to a combined total of 15 million throughout the rest of Panda Security’s 20-year history.
- Banker Trojans and fake antivirus programs topped the threat ranking
- Social networks (Facebook, Twitter, YouTube or Digg) and SEO attacks were favored by cybercriminals for spreading malicious code
- Politically motivated cyber-attacks significantly increased throughout 2009
Stayed tuned for my analysis as I read through the report but if you want to read it yourself you can find the pdf file here: 2009 Annual Report from PandaLabs.
Friday, January 15, 2010
Using Backup Assist with rSync.net servers
rsync.net's servers do not allow open access via the shell so I had to use the following steps to manual create and move the .ssh keys to the server:
1. Move any existing files out of the default location where Backup Assist stores the SSH keys.
- Windows XP: “C:\Documents and Settings\All Users\Application Data\BackupAssist v5\.ssh”
- Windows Vista/7: “C:\Programdata\Backupassist v5\.ssh.
3. Verify that three new files have been created in the local Backup Assist .SSH directory listed above. The files are:
- Ba_id_dsa
- Ba_id_dsa.pub
- known_hosts
5. Use WinSCP to connect to the rsync.net account you are configuring
6. Copy the local “authorized_keys” file in to the remote .ssh folder
7. Click on “Test connection…” in Backup Assist to confirm this worked.
8. If the test fails, restart at step 1 and verify that file time stamps on the local machine are current.
9. Disable the media usage report in the "rsync options" settings tab. The restrictions on the rsync.net server mean that the media usage report won't work either, but rsync.net provide other methods for getting server disk usage information.
Hope this information helps someone else!