Wednesday, June 24, 2009

Around The Horn vol.1,126

New Facebook blog: We can hack into your profile

By Caroline McCarthy

Well, here's an innovative way to get some buzz: FBHive, a new blog devoted to the discussion of all things Facebook, has debuted with the revelation that its creators have discovered a hack that can expose some crucial profile data.

No, it won't expose your personal photos or ...

Originally posted at The Social

Q&A: Kevin Mitnick, from ham operator to fugitive to consultant

By Elinor Mills

There is no question who the most famous hacker is. One of the first computer hackers prosecuted, Kevin Mitnick was labeled a "computer terrorist" after leading the FBI on a three-year manhunt for breaking into computer networks and stealing software at Sun, Novell, ...

Accusations of Murder, Jealousy, Revenge - Twitter Hacking

By Rik Ferguson on web

He probably only just woke up, but today is already a very bad day for American TV actor Dorion Standberry, one of the stars of College Hill on the BET network. His Twitter profile says “I act, I model, I sing, I socialize!!“, he can add “I get pwned” to that list now too.   It appears that [...]

IT Managers Under-Estimate Impact Of Data Loss

By Darknet on Information-Security

I find it a little surprising in this day and age that such a low percentage of IT managers believe data loss is a low impact issue. Don’t they read the news? Don’t they understand how losing customer trust can really effect your bottom-line? I would have thought 30% of respondents thinking data loss was high impact [...]
Related Searches
on Ask.com

Hong Kong

Kroll Ontrack

DNSSEC Showing More Signs Of Progress

The Domain Name System (DNS) security protocol is finally making inroads on the Internet infrastructure front, but big hurdles remain for widespread, smooth adoption

Facebook Hack Beats Privacy Settings

In Vulnerability Research

After waiting more than two weeks, bloggers went public June 22 with a report of a vulnerability on Facebook that can be exploited to reveal personal information. Facebook has reportedly fixed the flaw.

Cybersecurity, info sharing: House approves 2010 funding boost

The House recently approved a fiscal 2010 budget plan for the Justice Department that would increase funding compared to 2009 levels for some key information technology programs.

New organization to address interoperability between social media, ID management

The Kantara Initiative will provide a venue for the identity management industry to cooperate in developing interoperable technologies that will better enable identity-based applications and other interactive online transactions.

DOD: Be wary of social media's 'loose lips'

Two Defense Intelligence Agency experts explain how adversaries can use social-networking tools to gather information on targets.

ConSentry Impresses In Second Go-Round

Smart switch line enforces policy at the port.

Inside China's Spam Crisis

Approximately 70% of all domains used in spam since the beginning of 2009 have a Chinese top-level domain.

Rollout: Egress Offers Rights Management As A Service

Switch encrypts data, restricts access, but only in Windows environments.

U.S. State Dept. Condemns China's Green Dam Filter As Boycott Brews

China is insisting that computer makers install Web-filtering software known as Green Dam on all PCs sold in the country after July 1.

The Biggest Threat? It May Be You

When it comes to virtual server security, you might just be the weak link. Or, more precisely, your lack of planning, maintenance, and governance of that VM server farm.

Top European CIO’s book translated to English

One of the most popular books amongst European CIOs is now available in English. IT's Hidden Face, written by Claude Roeltgen the CIO of one of Luxembourg's top banks has been a top read amongst CEOs, CIOs and government ministers across the continent.
Related Searches
on Ask.com

European CIO

ScanSafe labels Nine-Ball attack as 'hype'

Security vendor Websense has been blasted for allegedly hyping up the so-called 'Nine-Ball' mass website compromise it made public earlier this week.
Related Searches
on Ask.com

Websense

Defense stalwarts see cash in cybersecurity

As the U.S. government goes on a cyberdefense spending spree, major government contractors are beefing up their network security expertise so they can get in on the action.

Working with consultants part 4

One test you can apply to judge the professionalism of a prospective consultant is to ask her to identify the limits of her professional competence. A professional consultant will clearly identify the limits of her knowledge.

AMD Chips Used in Iranian HPC for Rocket Research

The Web site of an Iranian research institute has posted the specifications of a high-performance computer that it built using AMD dual-core Opteron chips despite a U.S. trade embargo.
Related Searches
on Ask.com

AMD Chips

Heartland Commended for Breach Response

Heartland Payment Systems CEO Robert Carr has made several moves to address security following the massive data breach at his payment processing company earlier this year.
Related Searches
on Ask.com

Heartland Payment Systems

Robert Carr

Fraudsters try to scam security expert on eBay

When security expert Bruce Schneier tried to sell a used laptop on eBay, he thought it would be easy. Instead, a sale was aborted twice -- first by a scammer using a hacked eBay account and then by a buyer who tried to trick Schneier into sending her the laptop after she cancelled payment.
Related Searches
on Ask.com

Bruce Schneier

Sensitive data made available on Parcelforce website

Sensitive personal data including names, addresses and postcodes has been made publicly available on Parcelforce's website.
Related Searches
on Ask.com

Parcelforce

Facebook tackles potent click fraud scam
Disgruntled advertisers turn anti-social

Facebook is investigating reports that advertisers on the social networking site have been left well out of pocket as a result of click fraud.…

Related Searches
on Ask.com

fraud scam

Iranian hacktivists hand-crank DDoS attack
Farsi hackers do without botnets

The controversial outcome of the Iranian elections has spawned a parallel conflict on the internet.…

Related Searches
on Ask.com

DDoS attack

Scanning Windows Deeper With the Nmap Scanning Engine

Category: Penetration Testing

Paper Added: June 22, 2009

A Virtually Secure Browser

Category: Home & Small Office

Paper Added: June 22, 2009

phpMyAdmin Scans, (Sun, Jun 21st)

Happy Fathers Day (at least those in the USA), Earlier today one of our readers (Thanks Alice) noti ...(more)...

Say it ain't so.... , (Mon, Jun 22nd)

According to the Australian version of the SORBS website, Michelle (formerly Matthew) Sullivan ...(more)...

Incident response planning

By Robert Westervelt

Jack Phillips, managing partner of security research firm, IANS, talks about how companies can prepare to appropriately handle a security incident.

Gartner sees better days ahead for security budgets

By Robert Westervelt

Investments in managed security services, intrusion prevention systems and multifunction firewalls help buoy IT security budgets.

Financial security pros expect improved funding in second half of 2009

By Marcia Savage

A SearchFinancialSecurity.com survey indicates a security spending rebound in financial services with companies investing in authentication, encryption and network access control.

 
Related Searches
on Ask.com

network access control

Security researchers develop browser-based darknet

By Robert Westervelt

Called Veiled, the darknet only requires participants to use an HTML 5-based browser to connect and share data anonymously.

Database monitoring, encryption vital in tight economy, Forrester says

By Erin Kelly

A new report from Forrester Research Inc. examines eight database and server data security technologies and recommends small steps that can make a big difference.

 
Related Searches
on Ask.com

Forrester Research Inc.

Virtual appliances boost flexibility, improve security

By Eric Ogren

Companies see the benefits of placing network-oriented security on a faster processor.

Botnet platform helps cybercriminals bid for zombie PCs

By Robert Westervelt

Infected PCs are sold again and again on a new platform that enables cybercriminals to buy and sell victim's machines.

Month of Twitter Bugs project to document Twitter flaws

By Robert Westervelt

Security researcher Aviv Raff will document a number of cross-site scripting (XSS) flaws and other errors threatening Twitter users.

Microsoft cracks down on click fraud ring

By Robert Westervelt

Fraudsters used a click farm to simulate hundreds of thousands of clicks for specific advertisements. Experts say click fraud threatens the online advertising industry.

IT pros find corporate firewall rules tough to navigate

By Eric Ogren

Tweaking rules could result in disrupting business communications or opening a hole for unauthorized traffic. Firewall management tools ease the burden.

Security Software Market Revenues Jump Worldwide

Gartner estimates the security software market increased 18.6 percent in 2008 to $13.5 billion worldwide, with Symantec, McAfee and Trend Micro leading the way. According to Gartner, some of the growth was due to increased demand for appliance-based products.
- The market for security software made a strong showing in 2008, jumping nearly 20 percent to $13.5 billion, according to Gartner. The figure represents a roughly $2 billion increase for the market over 2007. Of particular note was an increase in demand for appliance-based products within e...

Brief: Security-software market shrugs off economy

Security-software market shrugs off economy

Spammer Ralsky Pleads Guilty to Stock Fraud (PC World)

In technology

PC World - Alan Ralsky, a spam kingpin who was convicted of felony bank fraud in 1995, could face more than seven years in prison after pleading guilty in a stock fraud case involving spam messages that pumped up Chinese "penny" stocks.

SB09-173: Vulnerability Summary for the Week of June 15, 2009

Vulnerability Summary for the Week of June 15, 2009

Cisco Security Center: IntelliShield Cyber Risk Report

June 15-21, 2009

Report Highlight: Iran Election Aftermath Plays Out Online

Oh, You Vulnerable Twit! Why Twitter Needs Security

The phenomenon known as Twitter continues to grow at a rapid pace. Here's why you need to beware of "twishing"—that would be Twitter phishing—and other Twitter security issues.

Google News "cyber security" | cyber security | information security | computer security

China Stands by Web Filter Program Despite Protests

PC World - Owen Fletcher - ‎4 hours ago‎

The US has asked China for a dialogue about the potential impact of the mandate on trade, effects on the free flow of information and "serious technical ...

World Briefing | Asia China: Artist Urges Online Boycott New York Times

US envoy denies complaining about Web filter People's Daily Online

China sticks to web filter plan The Press Association

Hollywood Reporter - NewsFactor Network

all 328 news articles »

Information Security: The Good, The Bad and The Ugly

TMC Net - Kevin G. Coleman - ‎17 hours ago‎

Whether you call it information security, cyber security or cyber warfare makes no difference; the situation is the same! Information security is treated as ...

arcelormittal security guard seeks charges against cop

Times - Ken Kosky - ‎5 hours ago‎

Karimi reported that the security officer approached in an aggressive manner and requested information about the traffic stop, Price said. ...

Check out your Social Security wage statement

Examiner.com - ‎17 hours ago‎

Although a note with a return address of IRS is likely to strike fear in the most stalwart heart, an item from the Social Security Administration deserves ...

Tips for how to boost your Social Security benefits Bradenton Herald

A way to boost Social Security Belleville News Democrat

all 24 news articles »

Cyber Security Czar Front-Runner No Friend of Privacy

Wired News - Ryan Singel - ‎11 hours ago‎

But Davis could excel in a new role as cyber security czar, says Marc Rotenberg, who heads the Electronic Privacy Information Center. ...

Private Facebook Info Exposed By Simple Hack

Dark Reading - Graham Cluley - ‎2 hours ago‎

Facebook's security has been called into question after the creators of a new blog discovered a hack that can expose private profile information of any user ...

Facebook flaw puts members at risk MyADSL

all 17 news articles »

Cybersecurity To Push For Standard For Info Security Products

Bernama - ‎Jun 19, 2009‎

KUALA LUMPUR, June 19 (Bernama) -- CyberSecurity Malaysia, the country's vanguard of cyber security, is pushing for the Common Criteria for information ...

Securing critical infrastructure needs holistic approach, panel says GCN.com

Analysis: One Step Behind Nextgov

all 3 news articles »

Trusted Computing Group to Demonstrate Pervasive Security at ...

Business Wire (press release) - ‎19 hours ago‎

The Gartner Group Information Security Summit will be held Monday, June 29 – Wednesday, July 1. The Summit will be located at the Gaylord National Resort, ...

IT - WAVX

Financial security pros expect improved funding in second half of 2009

SearchSecurity.com - Marcia Savage - ‎20 hours ago‎

After months of belt tightening during the global recession, some financial security ...

Smart Grid Security Frenzy: Cyber War Games, Worms and Spies, Oh My!

Reuters - Katie Fehrenbacher - ‎Jun 18, 2009‎

According to executives at computer security firm IOActive: Studies show that overall project costs are 60 times higher when gaps in information security ...

Smart Meter Security: A Work in Progress Greentech Media

all 17 news articles »

ITRI

Google Blog Search "cyber security" | cyber security | information security | computer security

The Cyber Shot Twittered Around the World : Information Security ...

11 hours ago by anthonymfreed@gmail.com (Information Security...  
The Department of Homeland Security (DHS) Office of Cybersecurity and Communications (CS&C) National Cyber Security Division (NCSD), the Department of Defense (DoD) and National Institute for Standards and Technology (NIST) Information ...
Information Security Resources - http://information-security-resources.com/
[ More results from Information Security Resources ]

Risk Management and Information Security: Merging into one ...

19 hours ago by Laura Mather  
Three times in the past two weeks I've been privy to a conversation about the difference between risk management and information security. Most organizations have separate functions for risk management and information security. ...
Silver Tail Blog - http://silvertailsystems.wordpress.com/

Cyber security agency ties up with British firm

35 minutes ago by Ians  
NEW DELHI - The government agency in charge of cyber security Tuesday signed an agreement with British IT and communication solutions provider BT for enhancing computer security and technology sharing. .... April 23rd, 2009 US adviser says cybersecurity must be joint effortSAN FRANCISCO — The challenge of protecting the government's computer networks is too big for any one agency to handle alone, a top adviser to President Barack Obama said Wednesday. ...
The Gaea News - http://blog.taragana.com/n/

Security Information and Event Management Software Market Defies ...

2 hours ago by Security Management News  
The vital importance of security software to organizations of all sizes has been clearly demonstrated by the news that worldwide security software market.
Exaprotect BlogManager - http://blogs.exaprotect.com/

Most companies don't protect vital information adequately ...

13 hours ago by Alan Harten  
According to the results of the research, 56% of the employees reported they frequently see confidential documents left behind on the printer and a little over half reported that they do not know of any security protocols that are in ...
Security Watch - Internet Security News:... - http://www.securitywatch.co.uk/
[ More results from Security Watch - Internet Security News:... ]

Security Information Event Management | CIO - Blogs and Discussion

18 hours ago
Banking, Telecommunications, Power and Energy - anyone and everyone is under internal audit and regulator scrutiny to implement a Security Information Event Management system.
CIO - Blogs and Discussion - - http://advice.cio.com/
[ More results from CIO - Blogs and Discussion - ]

Fergie's Tech Blog: Cyber Security Czar Front-Runner No Friend of ...

8 hours ago by Fergie  
Former Republican Congressman Tom Davis, reportedly President Barack Obama's top candidate for cyber security czar, voted repeatedly to expand the government's internet wiretapping powers, and helped author the now-troubled national ...
Fergie's Tech Blog - http://fergdawg.blogspot.com/
[ More results from Fergie's Tech Blog ]

InformationOverload: What is the Biggest Threat to Your ...

17 hours ago by ARMA International  
The answer is you. A recent study from the Ponemon Institute confirmed previous studies by others that the primary causes of weak information secruity are the organization's own employees. This study also suggested that employees are ...
InformationOverload - http://armablog.typepad.com/informationoverload/

Md. poised to reap cyber security rewards (Baltimore Sun ...

4 hours ago by sokdbot  
State may win big as increase in federal spending creates jobs, funds research Maryland technology companies that specialize in cyber security are expectin...
Slumped Over Keyboard Dead - http://www.slumpedoverkeyboarddead.com/
[ More results from Slumped Over Keyboard Dead ]

Cyber Security Czar Front-Runner No Friend of Privacy - JustGetThere

9 hours ago by nospam@example.com (JGT)  
If picked as cyber security czar, Davis would be given the difficult and sensitive task of coordinating a government-wide strategy to secure the government's computer networks — as well as help secure the wider internet. That's a job fraught with perils ranging ... But Davis could excel in a new role as cyber security czar, says Marc Rotenberg, who heads the Electronic Privacy Information Center. “He's a good pick,” Rotenberg says. Read full article. | Share. Comments ...
JustGetThere - http://justgetthere.us/blog/ - References

No comments:

Post a Comment

My Blog List