New Facebook blog: We can hack into your profile
By Caroline McCarthy
Well, here's an innovative way to get some buzz: FBHive, a new blog devoted to the discussion of all things Facebook, has debuted with the revelation that its creators have discovered a hack that can expose some crucial profile data.
No, it won't expose your personal photos or ...
Originally posted at The Social
Q&A: Kevin Mitnick, from ham operator to fugitive to consultant
By Elinor Mills
There is no question who the most famous hacker is. One of the first computer hackers prosecuted, Kevin Mitnick was labeled a "computer terrorist" after leading the FBI on a three-year manhunt for breaking into computer networks and stealing software at Sun, Novell, ...
Accusations of Murder, Jealousy, Revenge - Twitter Hacking
By Rik Ferguson on web
He probably only just woke up, but today is already a very bad day for American TV actor Dorion Standberry, one of the stars of College Hill on the BET network. His Twitter profile says “I act, I model, I sing, I socialize!!“, he can add “I get pwned” to that list now too. It appears that [...]
IT Managers Under-Estimate Impact Of Data Loss
By Darknet on Information-Security
I find it a little surprising in this day and age that such a low percentage of IT managers believe data loss is a low impact issue. Don’t they read the news? Don’t they understand how losing customer trust can really effect your bottom-line? I would have thought 30% of respondents thinking data loss was high impact [...]
Related Searches
on Ask.com
DNSSEC Showing More Signs Of Progress
The Domain Name System (DNS) security protocol is finally making inroads on the Internet infrastructure front, but big hurdles remain for widespread, smooth adoption
Facebook Hack Beats Privacy Settings
In Vulnerability Research
After waiting more than two weeks, bloggers went public June 22 with a report of a vulnerability on Facebook that can be exploited to reveal personal information. Facebook has reportedly fixed the flaw.
Cybersecurity, info sharing: House approves 2010 funding boost
The House recently approved a fiscal 2010 budget plan for the Justice Department that would increase funding compared to 2009 levels for some key information technology programs.
New organization to address interoperability between social media, ID management
The Kantara Initiative will provide a venue for the identity management industry to cooperate in developing interoperable technologies that will better enable identity-based applications and other interactive online transactions.
DOD: Be wary of social media's 'loose lips'
Two Defense Intelligence Agency experts explain how adversaries can use social-networking tools to gather information on targets.
ConSentry Impresses In Second Go-Round
Smart switch line enforces policy at the port.
Inside China's Spam Crisis
Approximately 70% of all domains used in spam since the beginning of 2009 have a Chinese top-level domain.
Rollout: Egress Offers Rights Management As A Service
Switch encrypts data, restricts access, but only in Windows environments.
U.S. State Dept. Condemns China's Green Dam Filter As Boycott Brews
China is insisting that computer makers install Web-filtering software known as Green Dam on all PCs sold in the country after July 1.
The Biggest Threat? It May Be You
When it comes to virtual server security, you might just be the weak link. Or, more precisely, your lack of planning, maintenance, and governance of that VM server farm.
Top European CIO’s book translated to English
One of the most popular books amongst European CIOs is now available in English. IT's Hidden Face, written by Claude Roeltgen the CIO of one of Luxembourg's top banks has been a top read amongst CEOs, CIOs and government ministers across the continent.
Related Searches
on Ask.com
ScanSafe labels Nine-Ball attack as 'hype'
Security vendor Websense has been blasted for allegedly hyping up the so-called 'Nine-Ball' mass website compromise it made public earlier this week.
Related Searches
on Ask.com
Defense stalwarts see cash in cybersecurity
As the U.S. government goes on a cyberdefense spending spree, major government contractors are beefing up their network security expertise so they can get in on the action.
Working with consultants part 4
One test you can apply to judge the professionalism of a prospective consultant is to ask her to identify the limits of her professional competence. A professional consultant will clearly identify the limits of her knowledge.
AMD Chips Used in Iranian HPC for Rocket Research
The Web site of an Iranian research institute has posted the specifications of a high-performance computer that it built using AMD dual-core Opteron chips despite a U.S. trade embargo.
Related Searches
on Ask.com
Heartland Commended for Breach Response
Heartland Payment Systems CEO Robert Carr has made several moves to address security following the massive data breach at his payment processing company earlier this year.
Related Searches
on Ask.com
Fraudsters try to scam security expert on eBay
When security expert Bruce Schneier tried to sell a used laptop on eBay, he thought it would be easy. Instead, a sale was aborted twice -- first by a scammer using a hacked eBay account and then by a buyer who tried to trick Schneier into sending her the laptop after she cancelled payment.
Related Searches
on Ask.com
Sensitive data made available on Parcelforce website
Sensitive personal data including names, addresses and postcodes has been made publicly available on Parcelforce's website.
Related Searches
on Ask.com
Facebook tackles potent click fraud scam
Disgruntled advertisers turn anti-social
Facebook is investigating reports that advertisers on the social networking site have been left well out of pocket as a result of click fraud.…
Related Searches
on Ask.com
Iranian hacktivists hand-crank DDoS attack
Farsi hackers do without botnets
The controversial outcome of the Iranian elections has spawned a parallel conflict on the internet.…
Related Searches
on Ask.com
Scanning Windows Deeper With the Nmap Scanning Engine
Category: Penetration Testing
Paper Added: June 22, 2009
A Virtually Secure Browser
Category: Home & Small Office
Paper Added: June 22, 2009
phpMyAdmin Scans, (Sun, Jun 21st)
Happy Fathers Day (at least those in the USA), Earlier today one of our readers (Thanks Alice) noti ...(more)...
Say it ain't so.... , (Mon, Jun 22nd)
According to the Australian version of the SORBS website, Michelle (formerly Matthew) Sullivan ...(more)...
Incident response planning
By Robert Westervelt
Jack Phillips, managing partner of security research firm, IANS, talks about how companies can prepare to appropriately handle a security incident.
Gartner sees better days ahead for security budgets
By Robert Westervelt
Investments in managed security services, intrusion prevention systems and multifunction firewalls help buoy IT security budgets.
Financial security pros expect improved funding in second half of 2009
By Marcia Savage
A SearchFinancialSecurity.com survey indicates a security spending rebound in financial services with companies investing in authentication, encryption and network access control.
Related Searches
on Ask.com
Security researchers develop browser-based darknet
By Robert Westervelt
Called Veiled, the darknet only requires participants to use an HTML 5-based browser to connect and share data anonymously.
Database monitoring, encryption vital in tight economy, Forrester says
By Erin Kelly
A new report from Forrester Research Inc. examines eight database and server data security technologies and recommends small steps that can make a big difference.
Related Searches
on Ask.com
Virtual appliances boost flexibility, improve security
By Eric Ogren
Companies see the benefits of placing network-oriented security on a faster processor.
Botnet platform helps cybercriminals bid for zombie PCs
By Robert Westervelt
Infected PCs are sold again and again on a new platform that enables cybercriminals to buy and sell victim's machines.
Month of Twitter Bugs project to document Twitter flaws
By Robert Westervelt
Security researcher Aviv Raff will document a number of cross-site scripting (XSS) flaws and other errors threatening Twitter users.
Microsoft cracks down on click fraud ring
By Robert Westervelt
Fraudsters used a click farm to simulate hundreds of thousands of clicks for specific advertisements. Experts say click fraud threatens the online advertising industry.
IT pros find corporate firewall rules tough to navigate
By Eric Ogren
Tweaking rules could result in disrupting business communications or opening a hole for unauthorized traffic. Firewall management tools ease the burden.
Security Software Market Revenues Jump Worldwide
Gartner estimates the security software market increased 18.6 percent in 2008 to $13.5 billion worldwide, with Symantec, McAfee and Trend Micro leading the way. According to Gartner, some of the growth was due to increased demand for appliance-based products.
- The market for security software made a strong showing in 2008, jumping nearly 20 percent to $13.5 billion, according to Gartner. The figure represents a roughly $2 billion increase for the market over 2007. Of particular note was an increase in demand for appliance-based products within e...
Brief: Security-software market shrugs off economy
Security-software market shrugs off economy
Spammer Ralsky Pleads Guilty to Stock Fraud (PC World)
In technology
PC World - Alan Ralsky, a spam kingpin who was convicted of felony bank fraud in 1995, could face more than seven years in prison after pleading guilty in a stock fraud case involving spam messages that pumped up Chinese "penny" stocks.
SB09-173: Vulnerability Summary for the Week of June 15, 2009
Vulnerability Summary for the Week of June 15, 2009
Cisco Security Center: IntelliShield Cyber Risk Report
June 15-21, 2009
Report Highlight: Iran Election Aftermath Plays Out Online
Oh, You Vulnerable Twit! Why Twitter Needs Security
The phenomenon known as Twitter continues to grow at a rapid pace. Here's why you need to beware of "twishing"—that would be Twitter phishing—and other Twitter security issues.
Google News "cyber security" | cyber security | information security | computer security
China Stands by Web Filter Program Despite Protests
PC World - Owen Fletcher - 4 hours ago
The US has asked China for a dialogue about the potential impact of the mandate on trade, effects on the free flow of information and "serious technical ...
World Briefing | Asia China: Artist Urges Online Boycott New York Times
US envoy denies complaining about Web filter People's Daily Online
China sticks to web filter plan The Press Association
Hollywood Reporter - NewsFactor Network
Information Security: The Good, The Bad and The Ugly
TMC Net - Kevin G. Coleman - 17 hours ago
Whether you call it information security, cyber security or cyber warfare makes no difference; the situation is the same! Information security is treated as ...
arcelormittal security guard seeks charges against cop
Times - Ken Kosky - 5 hours ago
Karimi reported that the security officer approached in an aggressive manner and requested information about the traffic stop, Price said. ...
Check out your Social Security wage statement
Examiner.com - 17 hours ago
Although a note with a return address of IRS is likely to strike fear in the most stalwart heart, an item from the Social Security Administration deserves ...
Tips for how to boost your Social Security benefits Bradenton Herald
A way to boost Social Security Belleville News Democrat
Cyber Security Czar Front-Runner No Friend of Privacy
Wired News - Ryan Singel - 11 hours ago
But Davis could excel in a new role as cyber security czar, says Marc Rotenberg, who heads the Electronic Privacy Information Center. ...
Private Facebook Info Exposed By Simple Hack
Dark Reading - Graham Cluley - 2 hours ago
Facebook's security has been called into question after the creators of a new blog discovered a hack that can expose private profile information of any user ...
Facebook flaw puts members at risk MyADSL
Cybersecurity To Push For Standard For Info Security Products
Bernama - Jun 19, 2009
KUALA LUMPUR, June 19 (Bernama) -- CyberSecurity Malaysia, the country's vanguard of cyber security, is pushing for the Common Criteria for information ...
Securing critical infrastructure needs holistic approach, panel says GCN.com
Analysis: One Step Behind Nextgov
Trusted Computing Group to Demonstrate Pervasive Security at ...
Business Wire (press release) - 19 hours ago
The Gartner Group Information Security Summit will be held Monday, June 29 – Wednesday, July 1. The Summit will be located at the Gaylord National Resort, ...
Financial security pros expect improved funding in second half of 2009
SearchSecurity.com - Marcia Savage - 20 hours ago
After months of belt tightening during the global recession, some financial security ...
Smart Grid Security Frenzy: Cyber War Games, Worms and Spies, Oh My!
Reuters - Katie Fehrenbacher - Jun 18, 2009
According to executives at computer security firm IOActive: Studies show that overall project costs are 60 times higher when gaps in information security ...
Smart Meter Security: A Work in Progress Greentech Media
Google Blog Search "cyber security" | cyber security | information security | computer security
The Cyber Shot Twittered Around the World : Information Security ...
11 hours ago by anthonymfreed@gmail.com (Information Security...
The Department of Homeland Security (DHS) Office of Cybersecurity and Communications (CS&C) National Cyber Security Division (NCSD), the Department of Defense (DoD) and National Institute for Standards and Technology (NIST) Information ...
Information Security Resources - http://information-security-resources.com/
[ More results from Information Security Resources ]
Risk Management and Information Security: Merging into one ...
19 hours ago by Laura Mather
Three times in the past two weeks I've been privy to a conversation about the difference between risk management and information security. Most organizations have separate functions for risk management and information security. ...
Silver Tail Blog - http://silvertailsystems.wordpress.com/
Cyber security agency ties up with British firm
35 minutes ago by Ians
NEW DELHI - The government agency in charge of cyber security Tuesday signed an agreement with British IT and communication solutions provider BT for enhancing computer security and technology sharing. .... April 23rd, 2009 US adviser says cybersecurity must be joint effortSAN FRANCISCO — The challenge of protecting the government's computer networks is too big for any one agency to handle alone, a top adviser to President Barack Obama said Wednesday. ...
The Gaea News - http://blog.taragana.com/n/
Security Information and Event Management Software Market Defies ...
2 hours ago by Security Management News
The vital importance of security software to organizations of all sizes has been clearly demonstrated by the news that worldwide security software market.
Exaprotect BlogManager - http://blogs.exaprotect.com/
Most companies don't protect vital information adequately ...
13 hours ago by Alan Harten
According to the results of the research, 56% of the employees reported they frequently see confidential documents left behind on the printer and a little over half reported that they do not know of any security protocols that are in ...
Security Watch - Internet Security News:... - http://www.securitywatch.co.uk/
[ More results from Security Watch - Internet Security News:... ]
Security Information Event Management | CIO - Blogs and Discussion
18 hours ago
Banking, Telecommunications, Power and Energy - anyone and everyone is under internal audit and regulator scrutiny to implement a Security Information Event Management system.
CIO - Blogs and Discussion - - http://advice.cio.com/
[ More results from CIO - Blogs and Discussion - ]
Fergie's Tech Blog: Cyber Security Czar Front-Runner No Friend of ...
8 hours ago by Fergie
Former Republican Congressman Tom Davis, reportedly President Barack Obama's top candidate for cyber security czar, voted repeatedly to expand the government's internet wiretapping powers, and helped author the now-troubled national ...
Fergie's Tech Blog - http://fergdawg.blogspot.com/
[ More results from Fergie's Tech Blog ]
InformationOverload: What is the Biggest Threat to Your ...
17 hours ago by ARMA International
The answer is you. A recent study from the Ponemon Institute confirmed previous studies by others that the primary causes of weak information secruity are the organization's own employees. This study also suggested that employees are ...
InformationOverload - http://armablog.typepad.com/informationoverload/
Md. poised to reap cyber security rewards (Baltimore Sun ...
4 hours ago by sokdbot
State may win big as increase in federal spending creates jobs, funds research Maryland technology companies that specialize in cyber security are expectin...
Slumped Over Keyboard Dead - http://www.slumpedoverkeyboarddead.com/
[ More results from Slumped Over Keyboard Dead ]
Cyber Security Czar Front-Runner No Friend of Privacy - JustGetThere
9 hours ago by nospam@example.com (JGT)
If picked as cyber security czar, Davis would be given the difficult and sensitive task of coordinating a government-wide strategy to secure the government's computer networks — as well as help secure the wider internet. That's a job fraught with perils ranging ... But Davis could excel in a new role as cyber security czar, says Marc Rotenberg, who heads the Electronic Privacy Information Center. “He's a good pick,” Rotenberg says. Read full article. | Share. Comments ...
JustGetThere - http://justgetthere.us/blog/ - References
No comments:
Post a Comment