Instead these unfortunate circumstances where they choose a period to Internet Payday Loan Internet Payday Loan it to go to wonder that means.

Sharp Ideas

Open Source, Future Technology, and the Web

Sharp Ideas header image 4

Entries Tagged as 'information security'

Attack of the iPods

May 22nd, 2006 · No Comments · USB, information security

Dr. Simson Garfinkel wrote an interesting piece for CSO on-line, detailing a threat that I have been trying to educate the public about for two years. In his article Attack of the iPods Mr. Garfinkel explains security risks due to direct memory access (DMA) that USB and Firewire devices have, making mention of the […]

[Read more →]

Tags:

New Common Vulnerability Scoring System (CVSS) holds promise for security community

February 18th, 2006 · No Comments · information security

NIAC* and the Forum of Incident Response and Security Teams (FIRST) recently release information on a Common Vulnerability and Scoring System (CVSS). CVSS is “is a vendor agnostic, industry open standard designed to convey vulnerability severity and help determine urgency and priority of response. It solves the problem of multiple, incompatible scoring systems and […]

[Read more →]

Tags:

Sharp Ideas’ Slurp Audit Exposes Threat Of Portable Storage Devices For Corporate Data Theft

January 24th, 2006 · 4 Comments · USB, information security, press releases

Contact:
Abe Usher
Sharp Ideas, LLC
703-830-9505
info@sharp-ideas.net
New proof-of-concept application demonstrates how quickly and easily an insider can utilize USB-enabled devices to steal data

Arlington, VA - January 25, 2006 - Sharp Ideas, LLC, an information technology consultancy that specializes in testing and creating cost-effective IT security solutions, today announced the release of Slurp Audit - a second generation proof-of-concept […]

[Read more →]

Tags:

Data theft: stories from the news and solutions

January 21st, 2006 · No Comments · data theft, information security

The crime of data theft is one of the most under-reported and difficult to detect crimes of the 21st century.
Data is the currency of the information age. Hackers, spammers, and other computer criminals are in a constant arms race with security professionals as they seek to find new ways to steal information. As […]

[Read more →]

Tags: