Click fraud shoots up in Q4, driven by botnets Click fraud, a big threat to the highly profitable pay-per-click search advertising business, increased significantly in the fourth quarter, thanks to scammers' rising and sophisticated use of botnets. Security networks send spammers underground Botnets will employ more obfuscated control techniques including the use of peer-to-peer networks during 2009, according to security researchers, following the McColo data center take-down last year. What the Web knows about you She had me at hello ... or just about. Our conversation had barely started when privacy activist Betty Ostergren interrupted me to say that she had found my full name, address, Social Security number and a digital image of my signature on the Web. Searching for the digital needle in a relational hackstack Let me share a few of the tools I use to help customers identify their possible exposure to information theft. Coming soon: Full-disk encryption for all computer drives The world's six largest computer drive makers Tuesday published the final specifications for a single, full-disk encryption standard that can be used across all hard disk drives, solid state drives (SSD) and encryption key management applications. Once enabled, any disk that uses the specification will be locked without a password -- and the password will be needed even before a computer boots. VA to pay $20M to settle data theft case The Department of Veterans Affairs has agreed to pay $20 million to military personnel to settle one of the government's most high profile and embarrassing data theft cases. The VA data theft in 2006, involved the theft of a laptop from an employee's home that contained the unencrypted personal records of 26.5 million military veterans and their spouses. The breech lead to several new laws concerning how the government and public companies are to treat such breeches. The laptop was ultimately recovered and the VA maintains that no personal data was ever compromised. 5 Musts for Advancing Video Surveillance in Security Video surveillance was once the exclusive province of physical security; operators looked at multiple video screens, each displaying the field of view of a single video camera, to monitor for security incidents. But increasingly, the charge of fully securing an organization's assets requires a larger number of cameras with multiple viewers of the video information. Banks, credit unions scramble in wake of Heartland breach In the first real indication of the scope of the recently disclosed breach at Heartland Payment Systems, banks and credit unions from Washington to Maine have begun to reissue thousands of credit and debit cards over the past few days. Obama to tap Symantec CEO Thompson for commerce secretary? A big fundraiser for President Barack Obama, Symantec CEO John Thompson is in the running for U.S. Secretary of Commerce, according to published reports. MySpace faces fresh controversy over sex offender issue Just two weeks after a task force whose formation was spearheaded by MySpace delivered a report saying that social networking sites were safer from sexual predators than many people had assumed, MySpace finds itself dealing with a new inquiry related to registered sex offenders by Connecticut's attorney general. Undercover theft retrieval software gets location tracking Orbicule has announced Undercover 3, a major new release of its theft-recovery software for Mac OS X. It costs $49. Who goes there? Identity management is all about who you are and what you should be allowed to do. This Product Guide describes the technology and how it works. January giveaways from Cisco Subnet and Microsoft Subnet Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here. |
No comments:
Post a Comment