More than half of booted workers steal data on way out, survey finds A survey of 945 individuals who were laid off, fired or quit their jobs in the past 12 months shows that 59% admitted to stealing company data and 67% used their former company’s confidential information to leverage a new job. Microsoft: Online gamers still a top malware target What's the most common type of malware on the Internet? Viruses? Botnet code? How about password-stealing worms, designed to victimize online gamers? Proposed law might make Wi-Fi users help cops A proposed U.S. law would require Internet service providers to store information about every user of their services and keep that data for at least two years, in a bid to crack down on Internet-based predators and child pornographers. First Symbian S60 3rd Edition malware spotted: F-Secure The first malware to exploit the Symbian S60 3rd Edition platform has been identified, according to security firm F-Secure, which says the code is a Trojan in the wild that may be used for spam among other purposes. Skype calls' immunity to police phone tapping threatened Suspicious phone conversations on Skype could be targeted for tapping as part of a pan-European crackdown on what law authorities believe is a massive technical loophole in current wiretapping laws, allowing criminals to communicate without fear of being overheard by the police. Researcher shows new SSL Web site hack A researcher has found a convincing way to hack the SSL protocol used to secure logins to a range of Web sites, including e-commerce and banking sites. Novell aquisition bolsters ID governance portfolio Novell has quietly bolstered its ID governance portfolio after acquiring the technology assets of a tiny British company and signing a 'perpetual' licensing deal with California-based ActivIdentity. Proposed Law Saves Internet User Data In the most recent effort to thwart child predators online, both the U.S. House and Senate are considering bills that would require any Internet access provider -- possibly including public Wi-Fi hotspots -- to retain Internet user data for up to two years. Adobe flaw heightens risk of encountering malicious PDFs Security companies are warning of a new flaw in two Adobe Systems programs that could compromise a PC merely by opening a malicious PDF file. Bradford's NAC Director gives pipeline firm more control Mark MacDonald was looking for NAC because he had trouble controlling outside contractors that need to connect to the Enbridge Gas Distribution corporate network in Ontario, Canada. Hiring levels show one local industry resilient to recession If employee headcount is any indicator, security is one industry which the recession is having no impact on. In fact, according to several vendors in Australia, the need for organisations to stay secure, regardless of the economic climate, is leading to an increase in staff numbers. BitLocker Extends Its Reach In WS2008 R2, BitLocker can encrypt removeable drives, but that capability comes with a catch, says blogger Glenn Weadock. JTAG Hacking Cisco Subnet blogger Jimmy Ray Purser explains JTAG, a nifty trick for testing, debugging faulty hardware. Tagging the native VLAN Cisco Subnet blogger Scott Hogg explains that in Cisco LAN switch environments the native VLAN is typically untagged on 802.1Q trunk ports, which is not the most secure. February giveaways from Cisco Subnet and Microsoft Subnet Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here. |
how in the world would such a ridiculous worm get in my system in the first place, i wonder?
ReplyDelete