FAQ: How to protect your PC against the Downadup worm Security experts say it's the biggest worm attack in years, call it "amazing" and report that it infected nearly 9 million PCs in just two weeks. Obama cybersecurity plan a golden opportunity for tech industry, Forrester says Tech companies will have a major opportunity to snag government contracts by working with the Obama administration on its planned cybersecurity goals, according to a new report from Forrester Research. 3 reasons why Obama's BlackBerry is a national security threat In a nut shell the BlackBerry service is too public to be used. Let's be rational here, how would you feel if you knew the president used a public copy of WindowsXP on all his PCs, or if he used a public copy of Internet Explorer and Outlook? How warm and fuzzy would you feel about the security of our gov’t secrets? Google Apps gets better password protection Google has upgraded its security for Google Apps which allows users to avoid passwords favored by hackers in the latest wave of attacks. Top 10 YouTube hacking videos Hacking for fun, profit and to meet women. These 10 YouTube hacker videos range from the humorous to the downright frightening. Some of them demonstrate live hacks, while others demonstrate the use of hacker tools. Debit-card processor claims data breach part of global fraud operation Heartland Payment Systems, the Princeton, N.J.-based provider of credit and debit processing, payroll, check management and payments services to more than 250,000 business locations across the country, Tuesday disclosed it was the victim of a security breach. Also: Banks warn debit card holders; processor acknowledges breach Microsoft issues patches for 'nasty' Windows bugs Microsoft last week patched three vulnerabilities in the Server Message Block (SMB) file-sharing protocol in Windows, including two that could make "Swiss cheese" out of enterprise networks, according to one researcher. Three years undercover with the identity thieves Salesmen and parents know the technique well. It's called the takeaway, and as far as Keith Mularski is concerned, it's the reason he kept his job as administrator of online fraud site DarkMarket. Information security 'how not to's' It's not easy getting information security right. It is easy to get advice (often from vendors who want to sell you their semi-magic fix for all that ails you) on what you... Virtualization security: So far nothing In April 2004 I wrote my first article on the topic of virtualization security. I was trying to bring attention to the security aspects of this "new" technology that was... SafeNet buys Aladdin then announces merger The owners of the encryption specialist SafeNet announced last week that it will acquire Israeli security vendor Aladdin Knowledge Systems for $160 million (£109 million), with the intention of eventually merging the two security companies. Embarrassing Insider Jobs Highlight Security, Privacy Holes Officials in San Francisco last summer found out just how easy it can be for one person to hold the city, or at least critical parts of its IT network, hostage for several days. In July, a disgruntled network administrator for the city locked up a multimillion-dollar municipal computer system that handles sensitive data. The employee, Terry Childs, refused to give up the password to the FiberWAN system, which he had helped design. Childs eventually gave the password to San Francisco mayor Gavin Newsom, but not before a lockout that lasted almost two weeks and cost the city close thousands of dollars to fix. Cisco PIX to ASA configuration migration tool, time is running short Cisco releases a free migration tool for PIX to ASA migration ahead of the end-of-life for PIX on July 28. January giveaways from Cisco Subnet and Microsoft Subnet Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here. |
No comments:
Post a Comment