Security Alert: SHA-1 cracked? |
In February this year, Slashdot (www.slashdot.org) published (unconfirmed) reports of the SHA-1 algorithm being cracked by a team of three Chinese researchers. The Secure Hash Algorithm (SHA) is a secure encryption algorithm used in security applications for online banking systems, in the creation of digital signatures for secure document transfer, hashing and the like. Time now, perhaps, to shift to the next lot of SHA variants-SHA-224, SHA-256, SHA-384, and SHA-512-cumulatively called as SHA-2. |
Security And The SMB |
Most networks are vulnerable to intrusions and virus attacks. With virus writers getting incredibly creative, and spawning by the dozen, a robust network is one that can react immediately to an attack and bounce back to normalcy, ASAP. A few tips to keep your SMB's internal network secure: Educating Your Employees End users are extremely vulnerable nodes in any network. Enforcing protocols, like not opening suspicious attachments, updating virus definitions regularly, using 'safe' sites for e-commerce transactions, not responding to spam, and perhaps subscribing to security updates/newsletters from a trusted vendor would help prevent many attacks. Also, employees should report virus attacks immediately, and download relevant patches. Setting complex passwords for accounts, and using encryption keys for transfer of confidential documents is equally imperative. Access To Key Network Resources Access to key network resources should be restricted to one or two people (preferably the CTO and the System Administrator) and all security breaches should be reported to the concerned authority. Software Updates It goes without saying that pirated software is a no-no. Regular updates of existing software will safegaurd your PC safe from newer, malignant malware. Security Audits Regular security audits-internal or external-are a must for any firm. With a slew of viruses and Trojans hitting the Interent on a daily basis, audits will let the administrative department know, how vulnerable a system is, to attacks. Again, the SysAdmin needs to involve users in security exercises. |