IAS Security Hero

Security

Welcome to the Network Security website at the IAS

This website brings you the latest news, how to's, tools and resources in Information Security.  Security Awareness for our Faculty, Members and Staff is key in creating a safer computing environment.

The three major Principles of Information Security, Availability, Integrity and Confidentiality, will be covered throughout the security awareness program at the Institute.  For a description of these principles, please see our About section.

In keeping with the spirit of the Institute, I encourage questions and open discussions about security.  And if you discover anything out of the ordinary, please feel free to bring it to my attention so that we can work together to create a more productive, safer environment.

Thanks,
Brian Epstein <security@ias.edu>
twitter: @epepepep

Recent Blog Posts

Shellshock, a Bash Code Injection Vulnerability

In late September, 2014, a bug was released to the public in the popular Linux/Mac shell called bash.  For those that aren't familiar, the shell is the black box that some computer folks seem to...

Cryptolocker is a new piece of malicious software that has started circling the globe in the last half of 2013.  Deemed "rasomware" by security professionals, Cryptolocker encrypts your files and demands payment to receive the key to decrypt them. ...

https://www.youtube.com/watch?v=Srh_TV_J144

Ellen did a great skit on the real world infomercial for the Password Minder. It is a good watch, especially if you are a fan of hers.

For some good tips on creating security, easy to remember passwords...

Phishing is a term used to describe a scam, a malicious attempt aimed at trying to trick you into divulging sensitive information via electronic communication. One recent avenue for this type of attack is through emails appearing to come from...

http://www.krebsonsecurity.com/2010/03/would-you-have-spotted-this-atm-fraud/

I don't know about you, but I cringe every time I go to an ATM nowadays.  "Why?" you ask.  Because I've heard of a lot of reports and seen a lot of pictures of ATM skimmers...

http://arstechnica.com/tech-policy/news/2009/09/your-secrets-live-online-in-databases-of-ruin.ars
http://privacy.cs.cmu.edu/dataprivacy/papers/LIDAP-WP4abstract.html
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1450006

We all know that...