Category Archives: Main

Encrypted ZFS Automatic Snapshots to Amazon S3 Cloud

 Are you test driving Amazon S3 cloud as your backup storage and worried about your data security ?  Now, Amazon S3 users can have a compelling encrypted backup solution by adopting to OpenSolaris and ZFS.  Few months ago, I had my first experience with ZFS Automatic Snapshots which allows to backup and preserve the filesystem at timed intervals.  Last week I noted from Glenn Brunette that… Read more »

Cloud Security Guidelines from Cloud Security Alliance !

Cloud Computing Security is getting hot this summer ! Without a doubt, the Cloud security issues has emerged as a top concern and gained got a lot of interests in the RSA conference ’09 (held last week). To the surprise, the newly formed “Cloud Computing Security Alliance” presented a report covering the critical areas of focus and provided a comprehensive… Read more »

NIST to set standards for Cloud Security !

      No Comments on NIST to set standards for Cloud Security !

Lately NIST is very much intrigued with Cloud computing infrastructures, …not sure it is part of President Obama’s Stimulus plan ! Without doubt it makes the US Government as the most influential Cloud customer. Like everyone else, NIST also feels Security as the paramount challenge ahead before adoption…. ofcourse, Security cannot be an afterthought or post-mortem process after a breach… Read more »

Conficker Worm to hit on April Fool’s day !

      No Comments on Conficker Worm to hit on April Fool’s day !

Looks like another malware storm…my buddy Microsoft Windows user is itching the head with a burning stick and cleaning up his entire data/malware center..as it is suspected that Conficker Worm (Conficker Version C and D) might have infected million of computers running MS Windows environment – not sure it affects both server and desktops. The worm is programmed to modify… Read more »

Demystifying MySQL Security for Web 2.0: Part 2

Access control exploits, user credential exposures and related security compromises are becoming increasingly common in Web 2.0 world ! Most of these issues pertain to broken or insufficient authentication controls and flawed credential management that allows attackers to compromise vulnerable applications by stealing or manipulating credentials such as passwords, keys, session cookies and/or impersonating another user through forged or guessed credentials.  Any such access control… Read more »

Demystifying MySQL Security for Web 2.0: Part 1

Web 2.0 applications are proliferating and it has become widely popular for delivering dynamic user-generated content, information collaboration, data mashups, social networking and Web services. Building security for Web 2.0 applications pose several daunting challenges to Web 2.0 developers as these applications are publicly accessible and it blindly opens door to several intentional/unintentional abuses and malicious practices including data interception and manipulation by… Read more »

Top Web 2.0 Security Threats !

      3 Comments on Top Web 2.0 Security Threats !

Web 2.0 is not my forte but I am not ignorant to know its overwhelming adoption and popularity !  In my understanding, Web 2.0 is another Web based application paradigm that enables delivering user-generated content via aggregation, participation and collaboration on the Internet using Web based protocols.  No doubt, everyday a new breed of Web 2.0 application is finding its… Read more »

Biometric adoption expected to grow "triple" between 2008-2012, despite economic downturn !

Lately, Biometric identification and authentication technologies gaining unprecedented importance in government organizations across the globe as evidenced in the US by introduction of HSPD-12, HSPD-24 and and other countries complying with ICAO requirements for biometric-enhanced machined readable traveller documents (MRTDs) / ePassports providing support for Facial/Fingerprint identification for travelers passing through airports, security-sensitive locations and ensuring protection against identity thefts…. Read more »

Dissecting the 'Obfuscated Transfer Object'

      2 Comments on Dissecting the 'Obfuscated Transfer Object'

One thing I noticed lately…is lot of interest about understanding the usage of ‘Obfuscated Transfer Object (OTO) ‘ from Core Security Patterns.  I got multiple emails about its code and implementation .. understandably there is a growing security concern about using Transfer Object (aka Value Object) that passes security-sensitive data elements between Java EE tiers (especially between Presentation/Business/Persistence), when the… Read more »

Top 25 Most Dangerous Programming Errors

      No Comments on Top 25 Most Dangerous Programming Errors

Few weeks ago, US Dept. of Homeland security (National Cyber Security Division) in collaboration with SANS Institute/MITRE teams worked together and released a list of 25 dangerous programming errors as common security flaws, which opens doors for easy exploitation. My first look at this list, I thought it is a old wine in a new bottle as the document sounded… Read more »