Thinking about Cost-Per-Application and VM Density
By vmtn@vmware.com (VMTN) on Technical Information
We announced a new calculator today, one that helps you start to look at the "cost per application" view of virtualization. This particular application isn't designed to measure total cost of ownership or total ROI, just what it costs you...
CanSecWest Pwn2Own: Would IE8 have been exploitable had the event waited one more day?, (Tue, Mar 24th)
Safe Internet web browsing experiences - a concept that tends to sometimes get
Software Maker Helps Companies Thwart Computer Security Threats (Investor's Business Daily) (Yahoo Security)Stuck In The Middle, Security Departments Turn To Outsourcing
Studies say more corporations are outsourcing security as a way to fight myriad threats, lower overall costs
Charlie Miller Does It Again At PWN2OWNBy Darknet on tipping point
You right remember in March last year we posted about Charlie Miller at the PWN2OWN contest owning the MacBook Air in under 2 minutes. Guess what? He’s done it again! This time though he’s even faster clocking in at under 10 seconds. No one else stood a chance. He walked off with the prize again, $5000 [...]
Worm breeds botnet from home routers, modems
More than 100,000 hosts invaded
Security researchers have identified a sophisticated piece of malware that corals consumer routers and DSL modems into a lethal botnet.…
Government Keeping Its .Gov Domain Names SecretDespite a presidential promise of openness in government, GSA officials decline to release the full list for fear of cyberattack.
Time To Get Serious About HIPAAIf your company qualifies as a covered entity under HIPAA, now is a good time to review your compliance efforts and fill in any gaps -- before the feds come calling.
Mandiant Appliance Accelerates Incident ResponseMIR gets to the heart of system compromises, but its forensic tools are limited.
Napera N24 Offers Turnkey NAC For SMBsAppliance provides a range of security features for Microsoft nets, but lacks in-depth reporting.
Facebook's New Openness Exploited By ScammersThe rogue message leads to a Facebook application link that spams a victim's friend list with the same warning message, and possibly harvests personal information.
Hack An iPhone, Win $10,000In TippingPoint's DVLabs contest, hackers also have the option of trying to execute a successful exploit against a Web browser.
Facebook Opens Site Rules To User Voting"The Facebook Principles" and "Statement of Rights and Responsibilities" may signal a shift in social networking best practices.
Spy Agency May Get More Cybersecurity DutiesThe National Security Agency should assume a greater role in defending the nation against cyberattacks, President Obama's intelligence chief told Congress Wednesday.
Marvell Unveils 'Plug Computing' PlatformThe tiny SheevaPlug computer provides always-on home network services, such as backup and file sharing, for a tenth of the power used by a regular desktop.
Microsoft Warns Of Zero-Day Excel ExploitThe vulnerability in Excel could allow an attacker to execute malicious code, if a user opens a specially crafted Excel file.
Meraki Launches 802.11n Access PointThe networking startup is trying to differentiate its products by having a lower price point and offering a hosted solution for network management.
VMware Adds To Data Center Operating SystemvCenter Server Heartbeat and vShield, launched at VMware's user group meeting, bring the company closer to supplying the data center operating system via its virtual machine management capabilities.
IT Security Remains Top Government CIO PriorityThose surveyed by TechAmerica say they'd also put IT infrastructure and management at the top of the list, including improvements in governance and standardization.
Top 20 Cybersecurity Defenses ProposedThe government-private organization guidelines are expected to become baseline best practices for computer security.
Five Years On, Can-Spam Gets HelpThe right mix of technical measures can keep most unwanted e-mail out of customers' in-boxes.
Music, TV Industries Call For Stronger Intellectual Property ProtectionsA trade group found that Russia, China, and other countries aren't adequately protecting copyrights in the global digital distribution of music and video.
Adobe Warns Of Critical Vulnerability In Acrobat, ReaderUsers are advised to disable JavaScript until Adobe releases a patch, which may not occur for more than two weeks.
'Sexy View' Malware Targets SymbianThe worm targets Symbian OS S60 3rd Edition handsets, and it can send a user's contacts, phone number, and other sensitive information to a remote server.
Black Hat: Google Gears Offline Data VulnerableGoogle defends its product after a demonstration of a Web service-based attack using a cross-site scripting vulnerability.
Black Hat: Security Pro Shows How To Bypass SSLMoxie Marlinspike captured 16 credit card numbers, seven PayPal logins, and 300 other miscellaneous secure login sessions in only 24 hours.
Forensic Science System In U.S. Needs OverhaulDigital evidence examiners have no agreed-upon certification program or list of qualifications, in addition to other issues, a report to Congress points out.
Microsoft Internet Explorer 7 Vulnerability Being ExploitedCyber criminals are using a malicious Microsoft Word file distributed through spam to attack an exploit Microsoft patched last week.
Sun Delivers Open Source Protocol For Encrypted DevicesThe communications protocol aims to help Sun's users and business partners more flexibly handle encryption keys while sidestepping costly licensing fees.
Google Wins Street View Privacy LawsuitA Pennsylvania judge said Google didn't violate the Boring family's privacy rights by taking pictures of their residence from a private road and publishing the images online.
About-Facebook: Zuckerberg Relents On Privacy RulesSocial networking site's CEO reverses course on new polices that drew fire from users.
Cisco Adds Security Apps To Home Wireless RoutersThe hardware includes an antivirus application and can provide reports on user control violations.
Three Arrested For Using Stolen Heartland Credit Card NumbersHeartland Payment Systems, which handles about 100 million payment transactions per month, reported in January that its network was compromised by malware in 2008.
Facebook's Terms Of Use Draw ProtestMark Zuckerberg clarifies for users that once they delete their accounts, friends will still retain their posts.
Prosecutors Reduce Charges Against The Pirate BayProsecutors acknowledge that the file-sharing site on trial in Sweden for allegedly infringing on film and music copyrights didn't copy files.
C-Level Executives Weigh In On Information SecurityOur survey results show CXOs "get it." Here's how to turn that common focus into stronger security.
Android Security Vulnerability ExposedThe bug lies in the media server of the browser, and it could potentially enable hackers to gain control of the audio and video function of an Android handset like the T-Mobile/HTC G1.
25 Things Facebook Couldn't Keep Secret In CourtRedacted portions of a PDF transcript from a court hearing to determine Facebook's settlement with ConnectU were revealed.
Microsoft Offers $250,000 Bounty For Worm AuthorsThe company has formed a cybersecurity posse with technology companies, academic organizations, and Internet infrastructure firms to dismantle the Conficker/Downadup worm's infrastructure.
FAA Computers Hacked, Employee Data At RiskTwo of the 48 files on the compromised server held the personal information of more than 45,000 individuals, the agency said.
Stimulus Bill Will Stimulate Health IT Adoption, JobsThe $21 billion for health IT programs in the U.S. economic stimulus bill will create career opportunities and fuel educational programs for professionals to acquire a mix of technology and clinical expertise.
Identity Thieves Face Pay CutWhile the number of fraud incidents is rising, criminals are earning less for each crime they commit.
BlackBerry Maker Acquires Certicom For $106 MillionCerticom's cryptography software has been adopted by the U.S. National Security Agency for government communications.
RIM Issues BlackBerry Security AdvisoryVulnerabilities in the BlackBerry Application Web Loader ActiveX control could allow an attacker to execute code remotely or cause Microsoft Internet Explorer to crash.
Microsoft Patch Tuesday Brings Four Fixes For Eight FlawsThe updates address vulnerabilities in Internet Explorer, Microsoft Exchange, SQL Server, and Visio.
Obama's Plans For Cybersecurity Draw PraiseTech industry leaders say the administration "gets it" when it comes to protecting nation's computing infrastructure.
Social Networking Sites Ink Safety PactThe online communities will work together to protect the interests of minors.
Windows Worm Didn't Ground French Planes, Official ClaimsThe planes had been grounded following a Conflicker worm infection that had spread last month throughout the French nonsecured internal naval network called Intramar.
What is Nortel up to?In all the bankruptcy noise surrounding Nortel, it's easy to miss that the company has bought up the intellectual property of Identity Engines, whose portfolio adds up to a NAC package.
Cold-boot attacks change the data leakage landscapeUntil 2008, the consensus had been that there would be no practical way to remove a RAM chip from a computer system without losing all contained data. However, last July, researchers published a paper about something quite amazing: most RAM chips maintain their data for several seconds without any power, thus allowing a channel for data leakage from any computer to which an attacker has physical access.
Slack audits facilitate corporate fraudUp to 70 percent of corporate fraud is committed by employees and occurs because of broken processes, according to consulting firm Deloitte.
Conficker's next move a mystery to researchersSecurity researchers are in the dark about what will happen next week when the newest variant of Conficker, 2009's biggest worm by a mile, begins trying to contact its controllers.
White collar crimes burnt by extreme fingerprintingCorporate crime scenes could be cleaned up in minutes, not hours, thanks to locally developed technology that uses extreme heat to reveal fingerprints.
Worm breeds botnet from home routers, modems
Posted by InfoSec News on Mar 24
http://www.theregister.co.uk/2009/03/24/psyb0t_home_networking_worm/
By Dan Goodin in San Francisco
The Register
24th March 2009
Security researchers have identified a sophisticated piece of malware
that corals consumer routers and DSL modems into a lethal botnet.
The "psyb0t"...
Nearly all firms suffer losses after cyber attacksPosted by InfoSec News on Mar 24
http://www.techworld.com/security/news/index.cfm?newsID=113225
By Joan Goodchild
CSO (US)
24 March 2009
Nearly all organisations have been hit by cybercrime with some 98
percent reporting tangible loss after being hit by criminals. In
addition, 46 percent have experienced downtime as a...
Posted by InfoSec News on Mar 24
http://fcw.com/articles/2009/03/23/web-cybersecurity-legislation.aspx
By Ben Bain
FCW.com
March 23, 2009
Three lawmakers are writing a bill designed to expand the cybersecurity
workforce and bolster collaboration between the public and private
sectors. Authors include Sen. Bill Nelson...
No comments:
Post a Comment