A recent video I filmed while on a press tour of the east coast – Dan Kaplan of Secure Computing Magazine was kind enough to interview me and ask me questions about why securing IT is so complex.
Many people have contacted my team and I over the last few days about the recent announcement by ElcomSoft, that they offer a tool to decrypt Bitlocker, PGP and Truecrypt volumes.
This $299 tool is advertised as getting you access to this encrypted data quickly and easily…
Now, this may sound exciting, but as they say, there’s always a catch – you need a memory dump from the machine from when it was authenticated to use this tool – yes, no recovery if you find a cold machine. You have to get access to it while it’s on and the user has logged in, then, after they switch it off, you can recover the data..
This will be old news to those of you who took the time to visit McAfee Focus 2012 , but for the rest – my team took the opportunity to introduce the concept of the McAfee “Little Red Box” in the Innovation roadshow.
It’s a prototype project that my team has been working on for some time now, and will go some way to answer the need to protect all the connected devices in your home.
My house is the classic connected home – I have the usual assortment of PCs and laptops that build up over the years, some relegated to the role of photo frame, others scattered around for occasional browsing and email use. There’s also the odd real photo frame (wirelessly connected to a media server of course), and on that topic, numerous Playstations, XBoxs, and other gaming consoles that my family enjoy.
If that wasn’t enough IP connected equipment, you can add into the mix more than one of every Apple device made – iPads, iPhones, Apple TV’s, even an Apple Mini, oh and a few Samsung internet connected TV’s as well.
I often jest that I have an internet-toaster, but I don’t. My wife thought about buying an internet-fridge, but the fact it didn’t support wireless put her off.
I must be forgetting something, as my router DNS server regularly gets maxed out – oh yes, I have Sonos throughout the house as well, and also a few Apple Airport Express wireless repeaters.
You don’t come to my place if you’re sensitive to EMF… Read more…
May 14, 2012 - Omni Los Angeles Hotel at California Plaza
Just a warning that I’ll be speaking at the CISO Summit on the 14th in LA – “Securing The Unsecurable” will be the topic. I look forward to seeing you there, and the usual rules apply – I’ll swap vanity short URLs on the http://mcaf.ee service for good jokes!
I just wanted to take a brief moment to thank all those who came and spoke to me after the ISACA presentation yesterday on “Securing The Unsecurable”. It’s great to hear that the direction I, McAfee, and our partner Accuvant are taking is indeed synergistic with our customers.
Thanks again to the 100+ people who attended my session, and I hope you found it valuable and not too dull, even though I overran my time slot outrageously.
For those in the Orlando area, you’ll find me presenting at ASIS International on the 20th – I’m talking about mobile security and consumerization, a topic close to most IT leaders hearts.
If you’re going to be there, please say hello, and of course my standing offer of a vanity http://mcaf.ee url in exchange for a good joke still holds.
I was in Madrid speaking at a conference a couple of months ago, and arriving after one of my favorite trans-Atlantic flights (you know the ones, where the ratio of screaming children to adults is not conducive to rest or even playing Angry Birds) I was excited to take one of the citi-cabs which have free wifi onboard to my hotel, a 45 minute journey away.
It was an interesting experience to say the least – though getting completely car-sick in the process, I managed to clear my inbox, answer a dozen questions on Community.mcafee.com, and also catch up with the news care of Google and the BBC. All in all, it was a most productive journey. Read more…
“McAfee launches a range of pharmaceutical anti-viral medications to thwart the growing problem of Biological computer viral attacks”
Sounds far fetched? Maybe not given that researches at Caltech have successfully engineered a biological computer which can calculate square roots using DNA replication.
Given that the researchers Lulu Quan and Erik Winfree have successfully demonstrated AND and OR logic gates at the biological scale, it’s inevitable in my mind that more and more complex systems will come in the future. Read more…
NOTE – Production-ready version 5.63 (as far as I am aware) is now available on CTOGoneWild
This version is a real departure from the 5.2 and before series, as I got rid of the dependence on IE for the UI – it was becoming a real pain, with IE trying to display first run screens, telling me it was not installed etc. Generally the IE object was unreliable to say the least.
Instead, I used a whole bunch of HTAs – This is nicer architecturally as each stands alone and can be modified as you see fit, so you can change the UI without changing the logic of the script, plus they run independently so if they crash and burn, again, no problems for the script.
Other than that, there were some more changes to make the “Run On Logon” code asynchronous, so it does not stall the user experience when provisioning them. You can find a full list of changes at the top of the autodomain.vbs script.
Finally, if you enjoy this tool and it saves you a whole bunch of time and effort, you might want to send me something from my Amazon Gift List? Thanks!
You can read more about the current version on my previous blog on this topic.