Here are some links of interest.
Thank you for those who take the time to reach out to us regarding any questions or comments about the link directory. Please note that while we appreciate the heads up we sometimes receive about dead links or outdated links, we do not update this list often. We will ignore requests from vendors or other marketing people to add their suggested links to this list.
[Link is broken] Bank (http://www.privcom.gc.ca/media/nr-c/2008/nr-c_081127_e.asp)
We usually think of access control in terms of identification, authentication, and authorization: accountability tends to get left to last. This story was interesting in that the problem stems from a failure of accountability.
A bit more sophisticated than optical character recognition.
[Resource no longer exists] DataLossDB (http://datalossdb.org/)
The Open Security Foundation’s (OSF) DataLossDB project is an interesting resource for information about data and confidentiality breaches. At a glance, it gives you news, latest breaches, a timeline of breach numbers, a “top ten” list, and other references you can use in security awareness materials, or for risk analysis.
Little known and seldom used settings that can help improve the privacy and security of your Facebook account. Similar settings may be available (and unused) on other social networking sites as well.
The Flash security settings panel, particularly the microphone and Webcam setting.
This is the presentation that was banned by a Boston court, detailing the specifics of how to defeat the “protections” on the Boston transit MiFare card. The same system is also in use elsewhere.
An attempt at a standard for penetration testing. Given the complexity of drawing up a pentest contract, I’m all for the idea, but I’m not sure how well this one works out. Probably needs more work.
Given the importance and wide use of US Social Security Numbers (even though the use is legally restricted), this article on how to determine SSNs is fairly important.
[Link is broken/resource may no longer be available] Web SSO (http://sso-analysis.org/)
An analysis of current Web-based federated ID and single-signon systems. Research paper, online checking tool, and a discussion forum.
[Site is gone – linking to Wikipedia instead] Biometric Consortium (http://www.biometrics.org/)
Might have been better in vendors, but …
[Article no longer available] Biometrics article (http://www.cccure.org/Documents/HISM/033-037.html#Heading3)
Good article from ISMH 1998 edition
US government and military sponsored program to assess face recognition biometric products.
[Resource is gone] Irises (http://www.photographyserved.com/Gallery/Your-beautiful-eyes/428809)
Some great high-resolution shots of human irises. The detail here shows why iris scanning can be used as a distinguishing biometric.
Pawsense is a program to determine whether a cat has been walking across your keyboard, and to disable the keyboard input until reactivated. It’s a bit of a joke, but an example of keystroke analysis biometrics.
Cute essay about password choice (although not much useful help).
[Link was broken – linked to possible new URL] Inkblot password generator/reminder (http://research.microsoft.com/displayArticle.aspx?id=417)
[Link was broken – linked to possible new URL] Naked password (http://www.nakedpassword.com/)
OK, this is probably a bad idea, but it does make some points about password choice. This is a system that you can install along with your password choice, or password change, feature. As the user enters the password, the password is analyzed for strength (length, characters, non-alpha, etc). The stronger the password the more of a picture of a lady is … revealed. On the one hand, it provides motivation for choosing stronger passwords. On the other, it may distract the user from memorizing the password. On the third hand, it may violate company policy, or open you to sexual harassment charges. Any takers for finding some other means of motivation that is less distasteful or troublesome?
[Site is gone] Top 500 worst passwords (http://www.whatsmypass.com/?p=415)
When having a discussion about passwords, if someone is recalcitrant, might be an idea to point them at this, and see if they turn red …
A list of the top 500 most frequently used (and therefore eminently guessable) passwords. If you see yours, change it.
Polly wanna crack a WPA network? A cloud based cluster is offering to help out, for a small fee. You send them a data capture, and they run a 130 million word dictionary against it, in as little as 20 minutes. Do you trust them? Are they going to be used to crack WPA networks? Is this sufficient impetus to move to WPA2? Are you going to create a longer passphrase?