What we’re reading, week of 7/21

Posted: July 21, 2008 in Highlights

We’ve noticed two key issues that have bloggers talking this week:

 

“Man in the Middle” Attacks

From Vulnerability Assessment & Penetration Testing…

Hacking Online Banking and Credit Card Transactions – And How to Prevent It

Daniel Hoffman explains, step-by-step and with diagrams, how a “man in the middle” attack works by exploiting SSL vulnerabilities. Our perspective is that there are some technologies that have taken this risk into account – stay tuned for a separate post on this topic.

 

From Schneier on Security…

Man-in-the-Middle Attacks

Meanwhile, Bruce Schneier discusses why MITM attacks are so successful online, and takes the security and web browser industry to task for not doing more to help users protect themselves.

 

iPhones in the Enterprise

From 360 Security…

5 Reasons Why the iPhone 2.0 is still not Enterprise 1.0 Ready

Andrew Storm builds his case against the iPhone as suitably secure enterprise tool. A well-reasoned sets of points, with a well-reasoned set of counterpoints to be found in the comments.

 

From DarkReading…

iPhone Smackdown: Security vs. Consumerization

Rich Mogull, on the other hand, discusses the entry of the “business iPhone” as a matter of a larger scale consumerization of IT, and offers practical advice for organizations trying to reconcile their security processes and policies with this disruptive device.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s