- Mobile Devices,
- Government Action,
- Attack Targets,
- Attack Techniques,
- Defensive Strategies.
Thursday, June 26, 2008
Twelve cyber security veterans, with significant knowledge about emerging attack patterns, worked together to compile a list of the attacks most likely to cause substantial damage during 2008. Participants included Stephen Northcutt, Ed Skoudis, Marc Sachs, Johannes Ullrich, Tom Liston, Eric Cole, Eugene Schultz, Rohit Dhamankar, Amit Yoran, Howard Schmidt, Will Pelgrin, and Alan Paller. Here's their consensus list.
Thursday, June 5, 2008
Renaming the Administrator Account is a measure that can add to security defense. It certainly enhances security by preventing script attacks that assume the admin or root names. Jesper Johansson and Roger Grimes discuss this in their TechNet posting “The Great Debate: Security by Obscurity”.
Read the full posting at http://technet.microsoft.com/en-us/magazine/cc510319.aspx
A posting on TechNet (by Jesper Johansson) discusses Vista Security changes. Jesper points out a few
- Accounts created during setup become administrators programs execute with Ambient Authority (administrative privileges, with free access to the file system.
- Default ACLs includes ACL entries for Everyone, Power Users, etc, this includes the default ACL for C:\ gave Read and Create access to Everyone.
- Limitations exist on ACLs to assign permissions to the an object that changes owner - permissions were not transferred.
- Owners have implicit rights to an object, no matter what permissions they need.
Read the full posting http://technet.microsoft.com/en-us/magazine/cc138011.aspx