This time, IT security event review of last month, the most interesting events, the fact that Latvia at least one aspect of IT security ahead of the United Kingdom, as well as the focus - updated intrusion testing toolset.
Start with some happy news, our most frequent blog readers certainly remember, the middle of summer, we conducted a study - an experiment to find out what is the overall picture of wireless network security in Riga. We will ride the car with some random route on city streets and signed up on the way encountered a wireless network sr location, their names and, most importantly, sr the encryption type you use these wireless networks. Then behold, IT security products and services company Sophos bloggers from Naked Security has also made a very similar experiment only the streets of London. So we had to be very interesting to compare how the London wireless networks look like compared to ours.
WEP encryption, which provides, as they say "false sense of security", or "a sense that all is well when in fact there is no" in Riga, 7% used the wireless network, while in London - 17%, which is even more than 2 times more than with us.
In late August, came in second this year Quartery McAfee Threats Report, which compiles information on the main developments in the world during the last quarter of IT security. When analyzing this report, we want to draw our readers' attention to certain aspects. First, it should be mentioned is still very topical and rapidly increasing amount of malware for mobile devices. Most have to worry about the Android platform for mobile devices users, because the vast majority of malware is being developed for this platform (more than 80%). Over the past three months alone, McAfee has compiled more than 4,000 new malware samples.
Recommendations for our readers to remain still the same old - to avoid illegal use Android Market to use mobile sr antivirus solution. Caution sr treat each new program installation phone from the official sr Android Market, users are yet no reviews first reading as well as a description of the software and what the right phone this software requires (hardly a program that need to be switched on the flash, sr you need full access to the Internet, sr and address the book).
Another important fact that we want to mention, after reading the report, it is the same malware growth of computers, and that is particularly important - malware developers sr also do not forget about Apple and even Linux users. Also, very recently discovered vulnerability in Java, which is already successfully malefactors were izmatojouši to directly attack Linux workstations. Therefore, let us be vigilant, update sr the antivirus, sr Java virtual machine plug-ins, Flash Player and web browser, in which case we can only feel safe from the ever-increasing malware attacks. Product News and Updates sr
It so happens that for the third time since our blogs exists, we have to write about this product update, but it would not be fair to mention. So the update is experienced Backtrack Linux 5 distrubutīvs - this time called the R3 version. BackTrack Linux distros is a key helper and companion to any security and intrusion tester because it is convenient and accessible way, one place already prepared include security testing tools for almost all occasions. As always, the distribution makers have taken time to honor, because it contains all previously existing in a distributed software updates, as well as a number - more than 60 new tools. All those who use any of the previous versions of BackTrack, their distributions can be restored to the latest version through software updates, the rest, as always, have the option to download the latest version, which is available in both the ISO and the VMware format, the distribution of web pages.
The fact that the Internet access point is not encrypted does not mean that you have Internet access. I have had a lot to connect to called "free-wifi" sr where the browser need to login in order to use it. I believe that Riga unencrypted sr data points sr are incorrect, or not to test accurately.
Yes, of course, is that the Internet point is not encrypted, does not mean that it gives access to the Internet. This apglvojums not izvteikts, not this, not the article for wireless network monitoring. Our aim was to determine the percentage of all networks are networks without encryption. One of the major risks that exist in using an unencrypted network, it is possible that it listens to a third party, to which we would like to draw attention to his article.
Notify me of new comments via email.
Sorry, your blog can not share posts by email.
No comments:
Post a Comment