Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Wednesday, March 18, 2009
Consumer groups launch badware-busting community; Web inventor Berners Lee conned by fake Web site
Hacked road signs is the latest incident in spate of mischief nationwide
Road signs hacked in NYC Electronic road signs in downtown New York City were broken into over the weekend and instead of telling drivers to go slowly next to a Houston Street construction site, they flashed prankster messages such as "New York is dying," according to a report from The New York Post.
Bomb hoax news fed to users after IP analysis Criminals are trying to trick users into downloading malware by luring them to a Web site that reports a hoax breaking news' story of a bomb explosion cleverly tailored to their location.
5 Things You Can't See on Your Network Networks today are blind. As analyst firms such as Gartner have pointed out, IT doesn't really know which users are on the network. Similarly, IT knows very little about the application traffic on the LAN.
SonicWall security devices embrace 802.11n SonicWall's unified threat management gear has embraced 802.11n wireless networks via a software upgrade and a new wireless controller under its Clean Wireless architecture, which scans for malicious traffic as it enters business networks from mobile devices.
China Mobile ordered to crack down on mass SMS ads Beijing has ordered China Mobile to crack down on mass text message spam and the sale of mobile phone numbers to advertisers after a media report showed the long-standing problems have survived efforts to stamp them out.
Leaked Comcast User Data Found Online Comcast has suffered a leak in its user data that went undetected for more than two months. And it was an alert PC World reader who helped uncover the leak, when a document containing 8,000 e-mail accounts and passwords was found on Scribd.com, according to the New York Times.
Safe job searching Are you on the lookout for IT work? If so, beware of identity thieves who are seizing upon the bad economy to scam job seekers, warns the Identity Theft Resource Center. The organization offers advice for online job searching.
Security management:3 key considerations What should you ask when buying security information management software?
Optimizing Systems Management. IT professionals will realize lower costs and simplified management with a systems management appliance. Appliance-based systems should include: Comprehensive inventory support, secure application distribution, application usage monitoring and robust reporting. Find out if an appliance-based system is right for your organization today. Download this whitepaper today.
The Need for an Adaptive Threat Management Architecture - Live March 31. Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group. Register today for this Live Webcast.
Preparing for the Next Cyber Attack. Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies. Download this Executive Guide now.