Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.


October, 2010

4 Things You Should Know About Microsoft UAC

Posted October 22, 2010    Peter McCalister

Microsoft User Access Controls (UAC) has been touted as the next great thing in desktop security, but does it really satisfy all you need in order to ensure security, compliance and productivity?

DEP Down Part 2: Why is DEP failing?

Posted October 21, 2010    The eEye Research Team

In the first part of the series “DEP Down”, we discussed how DEP (Data Execution Prevention) is not always enabled on the application targeted by attackers. When it is enabled, it can be defeated in a number of ways: Return-to-libc attacks These attacks, while normally limited to simple system commands, will always evade DEP as…


Stopping Good People From Doing Bad Things With Admin Rights

Posted October 21, 2010    Peter McCalister

Let’s face it – organizations cannot simply build walls to protect vital information anymore. However, in the process of adapting to this new virtual collaborative environment comes the enormous challenge of ensuring that privileged access to critical information is not misused. Walls that may have worked a decade ago are now practically irrelevant as users…


Adobe Shockwave Player RCSL Memory Corruption

Disclosed October 21, 2010    Fully Patched
Vendors: Adobe
Vulnerability Severity: High
Exploit Impact: Remote Code Execution
Exploit Availability:

6 Things You Should Know About Sudo

Posted October 20, 2010    Peter McCalister

Freeware isn’t always free.

Indirect Misuse of Privilege Lessons from Google

Posted October 19, 2010    Peter McCalister

Last week we posted on the three forms of misuse of privilege, followed by a recent example of malicious abuse, where a stock trader used his IT skills to circumvent the system.

Indirect Misuse of Privilege Is a Malware Imperative

Posted October 18, 2010    Peter McCalister

Indirect misuse of privileges is when one or more attack types are launched from a third party computer which has been taken over remotely. A startling statistic revealed by Gartner is that 67% of all malware detections ever made were detected in 2008. Gartner also estimates managed desktops, or users who run without admin rights,…


Retina Helps Identify Weak Certificates

Posted October 16, 2010    Peter McCalister

Microsoft has released a Security Advisory for the upcoming patch to increase minimum bit levels of certificates to 1024 bit security advisory 2661254. The expected release date for this patch is Oct 9th at which time the update will be available through Windows Update.

, , , , ,

Accidental Misuse of Privilege Lessons from ASU

Posted October 15, 2010    Peter McCalister

A common fear of all Chief Security Officers and Chief Information Officers is that their organization winds up in the press for some breach of privacy or data theft.

DEP Down: Part 1

Posted October 14, 2010    The eEye Research Team

Today we continue our series of technical blogs with a blog about DEP (Data Execution Prevention). There are many good blogs and articles about DEP which go into great detail over the what, where, when and how’s of DEP and as such, I will only keep the introduction at a very minimum. Please follow the…