Power grid is found susceptible to cyberattack An emerging network of intelligent power switches, called the Smart Grid, could be taken down by a cyberattack, according to researchers with IOActive, a Seattle security consultancy. Researchers make wormy Twitter attack Computer security researchers have devised a new Twitter attack that they say could spread virally, much like a worm on the microblogging service. A search is launched for Conficker's first victim Where did the Conficker worm come from? Researchers at the University of Michigan are trying to find out, using a vast network of Internet sensors to track down the so-called "patient zero" of an outbreak that has infected more than 10 million computers to date. ANSI Panel to Standardize Identity Theft Tracking Know the difference between 'identity theft' and 'identity fraud'? Don't feel bad if you don't. Even within the security industry, within the government, and within law enforcement, the terms are used interchangeably although they are in fact different. Report links Russian intelligence to cyber attacks A follow-up report authored by a group of cyber-security experts claims that Russian intelligence agencies were probably involved in the 2008 cyber attacks on Georgia. A hacking tool gets updated for the Mac Two well-known Mac hackers are updating a widely used hacking toolkit, making it easier to take control of a Macintosh computer. Crooks Flock to Rogue Antivirus Apps Chasing massive profits, crooks have unleased a flood of rogue antivirus programs that attempt to fool or scare unsuspecting PC users into forking over cash for an app that does nothing worthwhile. BBC says U.K. credit card information for sale in India Reporters from the BBC posing as fraudsters claim they bought names, addresses and valid credit card details of U.K. residents from a man the BBC identified as Saurabh Sachar in Delhi. China closes audiobook porn site in crackdown Chinese police closed a Web site that sold erotic audiobooks and arrested four people involved as the country continued its crackdown on Internet porn, state-run media said Friday. Security management: 3 key considerations What should you ask when buying security information management software? Enter for a Microsoft training giveaway from New Horizons New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31. Network World on Twitter Get our tweets and stay plugged in to networking news. |
No comments:
Post a Comment