The following contains various published articles written by the eEye Digital Security Team members and friends which are also available on their website.
Take a moment to read some of these "thought provoking" information on security
Code Red Update
A new, more malicious worm dubbed "Code Red II" is spreading around the
Internet allegedly more quickly than the first. At the same time, the original Code Red
worm has been gaining steam since its reemergence on August 1st.
The Use of
Application Specific Security Measures in a Modern Computing Environment
Current computer security practices tend to favor protecting the network as a whole,
and avoid the specific issues regarding an application hosted on that network. This leads
to problems with granularity. A traditional solution requires that all external defenses
force specific applications to deal with their own security implications. This practice
has flaws because not all implementations of a specific service are created equal.
CHAM (Common Hacking
Attack Methods) and its use in Retina the Network Security Scanner.
eEye Digital Security incorporates its proprietary CHAM technology in most of its
products. In this paper we focus on the use of CHAM in Retina, the Network Scanner. For
many clients, CHAM provides a level of value added unmatched by any security product in
FrontPage, the Front
Gate to Your Web Server
We've all seen the banners "Microsoft FrontPage Support!" and
"Microsoft Certified Solution Provider." The brilliant people at Microsoft have
done it again. To compete as a web hosting company you need to have FrontPage support.
Microsoft has made an easy to use product that has been set as the standard for end-user
web development. The other thing Microsoft has done again is designing a product that,
from the get-go, is insecure.
In God we trust, all
others we monitor
In present society, individuals are being watched in every aspect of their lives.
Privacy is no longer a privelige, but a desire. eEye has the ability to locate and analyze
an individual's profile. For instance, eEye can trace a person back to every place they
have ever lived and where their favorite places to shop are. If eEye can gather data about
personal transactions, imagine what a government agency can find out about an identity.
Work place security
extends to employee's homes?
Most computer savvy people by now have heard about cable modems. The technology behind cable modems might be a "tad" insecure itself but for the average home user it is a cheap way to get fast Internet access. It is also a good way to provide a fast connection for employees to work from home, and that is where the problem starts.