Welcome to our fully functional beta site. We welcome all comments
informed!
The Informatica blog - Authored by Claudiu Popa

Why Easter Eggs should be enjoyed at home, not at work

Like a few other traditions, Easter has its followers and they're well represented by children whose innate desire to seek and find things is matched by the chocolate goodies hidden for their pleasure.
 
Easter Egg Privacy and SecurityBut Easter Eggs take on a different meaning when it comes to software applications. They're fun little surprises tucked away in undocumented code and waiting for someone to trigger their launch sequence. For instance, the Google rotation roll that ensues once you type in "do a barrel roll" or any number of other hidden tricks.

Although these neat things can be hidden in anything from paitings to cars, you should always try to avoid Easter Eggs in systems and software intended for work. Why? Because by being undocumented, they increase the likelihood that they might represent a weakness in the software. They can do this in a variety of ways, from crashing the application if they don't see the input they expect to allowing malware to disrupt the system if no adequate protection is in place.
 
So if you're in charge of purchasing software, or sourcing technology, looking for undocumented 'features' should be a part of your selection process as a security measure against inadvertent vulnerabilities. But if you're like most people and are looking to enjoy Easter with your family, carry on, and don't worry about work until next week.
 
Happy Easter!

In the early 1920s, the Enigma machine was a portable encryption machine with rotor scramblers used for encoding and decoding confidential messages....
Bleeding hearts unite, the OpenSSL Heartbleed bug threatens to impact user privacy and business security online. There's a new security vulnerability in town. It's not even that new, we just didn't know about it until now. But it's a whopper and it threatens to i...
Independent risk assessments are the most basic best practice in business.Security is about risk. And risk is about numbers. Given the high probability of suffering data security and privacy breaches, is it any wonder compan...
Netflix just the latest brand used in wave of phone text support fraudEver wonder what the use of stealing millions of email addresses is? All those often downplayed, 'low sensitivity' data breaches have massive potent...
Layered SecurityI'm often surprised at the public's disappointment with the realization that security processes are not directly analogous to the medical notion of im...
Target breach will have serious consequencesThis past Christmas season hasn't been kind to the Target chain of retail stores nor to its brand. A brazen attack took place in December that affecte...

Welcome to Informatica

Be Secure.

Be Trusted.

Follow us on