Panda Security: Downadup worm now infects 1 in every 16 PCs The computer worm responsible for the biggest attack in years has infected at least 1 out of every 16 PCs worldwide, a security company said Wednesday, and may have managed to compromise as many as nearly 1 in 3. Four Years Later: Unlearned Lessons of ChoicePoint It's been four years since data broker ChoicePoint acknowledged the data security breach that put it in the middle of a media firestorm and pushed data protection to the top of the infosecurity community's priority list. Cisco patches CUCM, Cisco Security Manager Cisco released patches to two security holes: one affecting Cisco Unified Communications Manager, and the other affecting Cisco Security Manager. Heartland data breach could be bigger than TJX's A data breach disclosed Tuesday by Heartland Payment Systems may well displace TJX Companies' January 2007 breach in the record books as the largest ever involving payment data with potentially over 100 million cards being compromised. Plus: Banks warn customers as debit-card processor acknowledges breach ... "Larger than TJX?" Debit-card processor claims data breach part of global fraud operation Yahoo Mail gets an antispam boost Yahoo has taken new steps to sharpen its Webmail service's antispam capabilities, including the adoption of two commercial technologies and the testing of an open-source system, the company said Tuesday. Google shuts off antiphishing feature in Firefox 2.0 Google planned to turn off an antiphishing service used by Firefox 2.0 Monday, a Mozilla Corp. executive said Tuesday. RIM pulls bid for security vendor Certicom Research In Motion pulled its hostile bid for security vendor Certicom on Tuesday, the day after a judge issued an injunction that halted the offer. How to choose and use source code analysis tools The high cost of finding and patching application flaws is well known. Wouldn't it be cheaper to write secure code in the first place? Who goes there? Identity management is all about who you are and what you should be allowed to do. This Product Guide describes the technology and how it works. January giveaways from Cisco Subnet and Microsoft Subnet Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here. |
No comments:
Post a Comment