NHS worm infection was 'entirely avoidable', says review The infection of 4,700 PCs by a worm at three London hospitals in mid-November was "entirely avoidable," according to an independent security review. 911 fraudsters provoke, endanger public, law officers It's been a year since the FBI brought the problem to the public’s attention but it continues to plague: there has and continues to be a significant increase in the illegal activity know as “swatting” where criminals and pranksters call in a spoofed 911 call in hopes of drawing a response from law enforcement - usually a Special Weapons and Tactics (SWAT) team. Some Incidents Can Make Life Interesting No security manager wishes for a security incident . They can be costly, disruptive and a professional black mark. But getting to the bottom of a minor event -- one that causes no real harm or has a minimal effect but isn't run-of-the-mill and therefore requires a bit of investigating -- can make the job more challenging. You have to figure out just what happened so that you can prevent a recurrence, and you have to do it quickly so that damage is kept to a minimum. It's a time-sensitive task that requires quick thinking and expertise. We just had an incident of that sort, and it's an interesting story. Spotting a PC Infection It's a common fear, stoked by never-ending news of major threats like the Conficker worm and yet another Monster.com database hack: Is my computer infected with malware? Are You Addicted to Information Insecurity? A recent study has a finding that defies reason: close to half of 154 smokers who had surgery to remove early stage lung cancer picked up a cigarette again within 12 months of their operation, and more than one-third were smoking at the one year mark. Obama still won't say whether he's using a BlackBerry The mystery continues. President Barack Obama said in a television interview broadcast Monday he has a very secure handheld device, but he would not divulge whether or not he's still using his coveted BlackBerry . IE or Firefox: Which Browser is More Secure The conventional wisdom in security circles used to be that Microsoft's Internet Explorer was hopelessly attack-prone and that only someone with a cyber death wish would prefer it over such alternatives as Mozilla Firefox, Opera or Apple's Safari browser. Drive Makers Agree on TCG Encryption Standard The world's largest disk drive makers have pledged to support three new Trusted Computing Group (TCG) encryption standards for hard disk drives, solid-state drives and encryption-key management applications. How does Cisco IronPort prevent directory harvest attacks? Tom Topping, director of federal operations for Cisco IronPort gives his take on how IronPort prevents directory harvest attacks. IPv6 capabilities in Cisco’s IPS software version 6.2 Cisco Subnet blogger Scott Hogg assesses Cisco's support for IPv6 in the newest version of Cisco's Intrusion Prevention System. VoIP security: Share your concerns? Introducing new Cisco Subnet blogger and VoIP security author Patrick Park. Tell him your VoIP concerns. February giveaways from Cisco Subnet and Microsoft Subnet Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here. |
No comments:
Post a Comment