Latest Blog Posts

69dafe8b58066478aea48f3d0f384820

Harvard Researcher Arrested for Hacking MIT Network

July 22, 2011 Added by:Headlines

''Stealing is stealing whether you use a computer command or a crowbar, and whether you take documents, data or dollars. It is equally harmful to the victim whether you sell what you have stolen or give it away," said U.S. Attorney Carmen Ortiz...

Comments  (0)

16443e0c6f6e4a400fd0164b3c406170

Patient Data: The Crown Jewels

July 21, 2011 Added by:Christopher Burgess

When the first five months provides a rate of one million records a month in lost patient data, by year’s end five percent of the US population will have had their medical records compromised. We have no choice but to take action now and keep the second half of 2011 from replicating the first...

Comments  (0)

37d5f81e2277051bc17116221040d51c

What To Do If Your Gmail Account Has Been Hacked

July 21, 2011 Added by:Robert Siciliano

Once Kate went through this process, she regained control of her account within minutes. But the criminal had deleted every single email, leaving her with nothing. He’s probably going through those messages now, searching for any useful personal information...

Comments  (6)

69dafe8b58066478aea48f3d0f384820

Iran Still Struggling With Stuxnet Virus Infestation

July 21, 2011 Added by:Headlines

"Tehran never did overcome the disruptions caused by Stuxnet or restore its centrifuges to smooth and normal operation as was claimed. Indeed, Iran finally resorted to the only sure-fire cure, scrapping all the tainted machines and replacing them with new ones..."

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

Plugging Breaches with Bureaucrats

July 21, 2011 Added by:Mike Meikle

Systems and software are designed by humans and there will be flaws that can be exploited. Plus, social engineering will always provide a path to compromising the most secure systems due to the fallibility of the human element. Legislation will not address these factors...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Can the NSA Defend America Against Cyber Attacks?

July 21, 2011 Added by:Headlines

“In an era when our nation and its allies are increasingly dependent on the integrity of information and systems supported, transmitted, or stored in cyberspace, it is essential that that space is as resilient and secure as possible," said NSA Deputy Director John C. Inglis...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Long-Term Impact of Short-Term Problems

July 21, 2011 Added by:Rafal Los

How long do you suppose it will be before one of these companies that's had a catastrophic, board-level security awakening forgets it ever happened and goes back to it's old practices of ignoring security? Six months? A year? Three years?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Anonymous Issues Statement in Response to FBI Arrests

July 21, 2011 Added by:Headlines

Rogue hacktivist group Anonymous has issued a statement in response to the arrest of fourteen alleged members who are being charged with participating in the DDoS attacks against online payment processor PayPal that occurred late last year. More arrests on the way - expect them...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Surveillance or Security? New Wiretapping Technologies

July 20, 2011 Added by:Ben Rothke

Far too many books on privacy and surveillance are filled with hysteria and hyperbole and the threat of an Orwellian society. This book sticks to the raw facts and details the current state, that of insecure and porous networks around a surveillance society...

Comments  (1)

509ea0c1f4a210534eb004d35c10aa2d

ISA Testimony Before House Cyber Security Task Force

July 20, 2011 Added by:Marjorie Morgan

Speaker of the House Boehner has appointed a task force comprised of Members from the major Committees of the House to develop a framework for cyber security legislation. The ISA was the very first organization that was asked to testify before the Task Force...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Russia Amends Federal Data Protection Law

July 20, 2011 Added by:David Navetta

In the past, some of the strict foreign data protection laws have not been rigorously enforced, giving businesses breathing room. The enforcement landscape is likely to tighten in the near future, however, increasing the risk of investigations and sanctions for privacy violations...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Fostering Compliance Across Your Company

July 20, 2011 Added by:Thomas Fox

Without the support of top management, a compliance program is doomed to failure. This also means that the goals of compliance need to be incorporated into overall leadership goals. If goals are simply performance based, employees will understand that is what the company values...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Canadian Hacker Arrested for Creating Zombie Botnet

July 20, 2011 Added by:Headlines

Canadian authorities have arrested a 24 year old professional information security manager on charges of creating a botnet. Joseph Mercer also infected systems with keylogging software to harvest information, as well as software that allowed him to capture images from unsuspecting victim's webcams...

Comments  (2)

F29746c6cb299c1755e4087e6126a816

Not All Free Identity Theft Services are Created Equal

July 20, 2011 Added by:Kelly Colgan

In order to sign up for identity theft protection services, you have to hand over a lot of vital data about yourself. Do you really want to give this to a company you’ve never done business with before—especially one that’s offering you something for free?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

F-Secure: Malicious PDFs Targeting Defense Contractors

July 20, 2011 Added by:Headlines

"It's a PDF file... sent to an employee of a targeted company as an email attachment. It exploits a known Javascript vulnerability and drops a... backdoor. A decoy PDF file is shown... [as] a call for papers for 2012 AIAA Strategic and Tactical Missile Systems Conference... classified as SECRET..."

Comments  (1)

Ec9b0ab31140696dd578b354b1054635

On Romulan Ale and Bird of Prey Malware

July 20, 2011 Added by:Vulcan Mindm3ld

Defenders are bound by a set of process and procedures. An organization’s inflexibility in deviating from them compound the problems. Many changes are often rejected on the basis of economic concerns. The majority are focusing on useless security guidelines such as the DISA PDI GEN001280...

Comments  (2)


« First < Previous | 290 - 291 - 292 - 293 - 294 | Next > Last »