Top 10 Security Nightmares of the Decade Blame the Internet for the latest decade of security lessons. Without it, you probably wouldn't even recognize the terms phishing, cybercrime, data breach, or botnet. Let's revisit the top security horrors of the past ten years, and try to remember what we learned from each. Y2K all over again in 2010? A decade after the Y2K crisis, date changes still pose technology problems, making some security software upgrades difficult and locking millions of bank ATM users out of their accounts. Secure USB Drives Not So Secure Vendors admit many hardware-encrypted USB memory sticks contain a dangerous flaw that make them easy hack targets, and many more may be vulnerable Restore Data After Motherboard Death Peter's motherboard died. How can he retrieve the data on his hard drive? Things That Didn't Happen in '09 And Probably Won't in '10 We look back at how well GFI's David Kelleher did on predicting what was NOT likely to happen in the security department this year. Large-scale attacks exploit unpatched PDF bug Hackers are exploiting a bug in Adobe's PDF software with both target and large-scale attacks a week before a patch is slated to be released. Social networking hacks: Top 10 Facebook and Twitter security stories of 2009 Facebook and Twitter are in hackers' crosshairs in the top social networking security stories of the year. Mac security reality check: mobile tech Portable technology--laptops and iPhones particularly--come with their own special security risks. They can be lost, for starters. And iPhones can be made especially vulnerable if you jailbreak them. Here are some tips for keeping your mobile technology--and you--safe. FBI investigating online school district theft A New York school district has reverted to using paper checks after cybercriminals tried to steal about US$3.8 million from its online accounts just before Christmas, prompting an FBI investigation. Heartland breach shows why compliance is not enough Nearly a year after Heartland Payment Systems disclosed what turned out to be the largest breach involving payment card data, the company remains a potent example of how compliance with industry standards is no guarantee of security. Outlook 2010 IT skills checklist: The vertical climb Security, virtualization and cloud computing skills will help IT pros woo hiring managers, but the real advantage to candidates comes by way of industry specific-knowledge that helps them boost the business' bottom line with their high-tech talent. Why traditional security doesn't work for SOA SOA's strengths turn out to be highly exploitable entry points for attackers Google Chrome OS may be security hotspot in 2010 Google's Chrome OS will be "poked" by hackers in 2010, in large part because it will be the "new kid on the block," a security researcher predicted Wednesday. Zeus, Koobface, Conficker: How to fight Cisco Systems Inc. highlighted the top security threats of 2009 by presenting Cybercrime Showcase Awards as part of its Annual Security Report. Today from the Subnet communities New giveaways! Win a year's worth of 24/7 video training from ClipTraining. Win books on WS2008 R2, Cisco WAAS and the CCIE. Deadline Jan. 31. Plus: On Cisco Subnet: Cisco buys Rohati Systems; On Microsoft Subnet: Charting out prices for Office 2010; On Google Subnet: Google plans free white spaces database. Network World on Twitter? You bet we are |
No comments:
Post a Comment