1. This type of Internet application allows end users to read and write personal email at work. What is it?
Web Application Attacks Learning Guide
Your data may be your most precious asset. Do you really want to see next season's software, industrial design or previous intellectual property walk out the door? To protect against podslurping and other network intrusions targeting individual computers, experts recommend that administrators develop and enforce effective endpoint security policies.
Topic: Endpoint Security
Learn how to build, implement and maintain secure procedures for keeping your network safe from potentially insecure laptops, desktops, PDAs and other endpoint machines.
Answer: instant messaging
Threats: Instant messaging (IM) security risks, especially the potential for data leaks and policy breaches, are the biggest reasons businesses and organizations need to secure their IM clients. Security Expert Michael Cobb, in this Q&A, writes that:
"As one of the most widely deployed applications on the Internet, instant messaging, or IM, has increasingly become a target for attackers. Threats range from IM-borne viruses, worms, SPIM (spam over IM), malware and phishing attacks. Unfortunately, controlling the use of IM within an organization is quite difficult."
Read the rest of Cobb's answer
IM security address both risks and compliance requirement.
Review how to secure instant messaging.
Then, try your hand at this short IM quiz from SearchSecurity.com to see if you've internalized what you've learned.
Answer: picture messaging in camera phones
Disgruntled employees taking pictures of confidential documents? Prototypes showing up in the background of Facebook photos and blogs? Scary. Perhaps more significant, however, is the possibility that in order to send and receive images, users will disable image filters on Outlook, allowing image spam and phishing attacks to slip through.
Threats: Unless you've been holding onto your old Palm, the odds are that your current PDA is a BlackBerry or Treo. Losing them may be the primary concern but viruses can be transferred onto the corporate server when they synchronize.
According to security expert Mike Chapple, "There are certainly some security concerns related to using services like Skype on an enterprise network. Specifically, Skype does not publish the details of its security controls, and some traffic may take place in an unencrypted fashion. Therefore, I would not recommend using the technology for confidential information."
Read the rest of Chapple's discussion of Skype dangers
High-risk flaws in Skype
Skype Trojan: Much ado about nothing?
IM, Skype, P2P open security holes: Survey
Can Skype phones threaten an enterprise network?
Skype: Its dangers and how to protect against them
Answer: desktop widgets
Attackers have already discovered how to exploit a flaw in Yahoo!'s Widgets to run malicious code on compromised Windows computers. Few users realize that downloading, installing and running these small applications may open up a vulnerability -- and administrators may not see the issue until it's too late.
Answer: SaaS applications
Threats: Web applications of any sort, including SaaS apps, are exposed to a wide variety of threats and potential vulnerabilities that can put an entire enterprise at risk. Whether it's the method used is cross-site scripting, command injection, path traversal attacks or buffer overflows, compromised SaaS applications are bad news for everyone.
Answer: Second Life
While phishing or identity theft scams are still in their infancy in the context of 3-D virtual worlds, the software and updates that the software client frequently requests aren't just a drag on network resources. Like widgets, automatic updates can be used by hackers to bring malware into the user's PC.
Answer: social networking
Threats: Social networking sites so far have been hit mostly by annoying worm, adware and phishing attacks.
Read the rest of Ed Skoudis' explanation of social networking dangers
What are the risks of social networking sites?
Black Hat 2007: Researchers demonstrate webmail, social networking flaws
Hackers planning cyberwar on social networking sites
Social-networking sites rife with wormable flaws
Social networking gone bad