Latest Blog Posts

69dafe8b58066478aea48f3d0f384820

Apple Lied: Filed Patent for Mobile Device Tracking

April 29, 2011 Added by:Headlines

Revelations of the patent application now confirm suspicions that Apple was quite aware of the storage of geolocation tracking data, that it was not merely a database of Wi-Fi locations, and the building of location histories on their customers was not due to a software glitch...

Comments  (3)

850c7a8a30fa40cf01a9db756b49155a

PS3 Cluster Attacks: Shall We Play a Game?

April 28, 2011 Added by:J. Oquendo

While 70 million people or so are complaining about not getting their Modern Warfare fix, an interesting e-mail made its way into my inbox. It touched on an altogether bigger problem that Sony may have on their hands - that the entire world for that matter may have on their hands...

Comments  (4)

44a2e0804995faf8d2e3b084a1e2db1d

Cyber Conflict in Dutch National Risk Assessment of 2010

April 28, 2011 Added by:Don Eijndhoven

The odds of fending off a large scale cyber conflict are against the Netherlands, but I don´t believe there is any other ´connected´ nation who is faring any better. Luckily many of the earlier initiatives with regards to Critical Infrastructure have been about recovering services...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DOJ: FBI Unprepared to Combat Cyber Security Threats

April 28, 2011 Added by:Headlines

"One agent who had recently been assigned his first counterterrorism intrusion case said that he did not know how to investigate a national security intrusion case. He was concerned about is ability to perform the investigation, especially because he viewed it as a significant case..."

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Experts: Is Iran Crying Wolf over Stars Malware Attack?

April 28, 2011 Added by:Headlines

"Given the lack of opaqueness on the part of Iran, it seems unlikely that there has been anything new discovered and it is questionable as to whether or not anything at all was found, and if something was, whether or not it was truly malicious..."

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Reading Between the Lines: The Sony PSN Breach

April 28, 2011 Added by:Rafal Los

What are PSN gamers/users more worried about? Are PSN gamers more worried about their heard-earned trophies and status on their favorite games, or the fact that their personal information and maybe even their credit cards were pilfered?

Comments  (3)

69dafe8b58066478aea48f3d0f384820

White House Official: Attacks are Risk of Doing Business

April 28, 2011 Added by:Headlines

In the wake of several substantial consumer information breaches such as those at Sony and Epsilon, White House cybersecurity coordinator Howard Schmidt sought to downplay the level of concern in stating that cybersecurity events are simply a business-side risk like any other...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Data Security Ramifications of E-Waste

April 28, 2011 Added by:Allan Pratt, MBA

What are the data security and compliance implications if you have all of your confidential data on your computer hard drive or laptop? What if you are a policeman, school teacher, or lawyer – and the contact list on your phone includes information you are legally bound to not share?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Feds to Remove Coreflood Botnet from PCs Remotely

April 28, 2011 Added by:Headlines

In an unprecedented move, the Department of Justice has sought a preliminary injunction in U.S. District Court that will allow the agency to issue instructions to systems infected by the Coreflood botnet that will cause the malware to delete itself...

Comments  (0)

D15e0b682a84587af9af463961d00f22

IT Security - Who Watches the Watchmen?

April 27, 2011 Added by:John Nicholson

There are risks associated with allowing your data and applications to sit somewhere else, and some of these risks become more pronounced when you are operating in a cloud-based environment with little assurance about the physical location of your data. However, these risks can be managed...

Comments  (4)

49afa3a1bba5280af6c4bf2fb5ea7669

Smart Grid in the Old Dominion

April 27, 2011 Added by:Mike Meikle

How will infosec be impacted by the push toward Smart Grid technologies? Information security skills encompassing everything from applications to hardware will be in great demand. The collected data needs to be securely protected when utilized by the consumer and provider...

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SMBRelay Attacks on Corporate Users Part 2

April 27, 2011 Added by:Alexander Polyakov

MS Office programs will show an alert to our victim if it couldn't download content from a remote resource. We could put a document on our shared resource and when MS Office opens the doc, it takes a style sheet from our shared resource and doesn't show an alert to the victim...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Joint US - Russian Report on Critical Cyber Terms Released

April 27, 2011 Added by:Headlines

“It may seem like a small step, but Russians and Americans have never before sat down and really agreed on the terms that are the prerequisite for rules of the road for cyber conflict. Defining terms together is the first step for creating international cybersecurity agreements...”

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Microsoft Statement: We Collect Your Location Data Too

April 27, 2011 Added by:Headlines

Microsoft insists that if the Wi-Fi feature is disabled on a device that no location data is collected or transmitted, and also states that even if the feature is active, data is only collected if the user gives an application permission to access location data...

Comments  (0)

27ef2e87221c355f517e2824b19f7ca6

Sony PlayStation Hack: 70 Million Users' Details Stolen

April 27, 2011 Added by:Jared Carstensen

What this means for those affected: Your name, date of birth, address, billing address and contact details are most likely not going to change - so this information could be as valuable in a year or two to these criminals, as it is now - potentially even more valuable...

Comments  (14)

69dafe8b58066478aea48f3d0f384820

Apple Posts Statement on iOS Location Data Collection

April 27, 2011 Added by:Headlines

Apple confirms collecting location the data, but states that the information only reflects a database of Wi-Fi hotspots and transmission towers that a phone has come into signal range of - which is akin to saying your car is not tracked, just the streets it has been driven on...

Comments  (0)


« First < Previous | 290 - 291 - 292 - 293 - 294 | Next > Last »