Latest Blog Posts

9259e8d30306ac2ef4c5dd1936e67634

Business Continuity for SMB's – A Necessity or Not?

April 13, 2011 Added by:Dejan Kosutic

There is no difference between large organizations and small with regard to business continuity framework - they both have to think in detail what preparations they need to perform in order to survive a disaster. The difference is SMB's can do it with very little investment...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Email Malware Increases 400% Since Rustock Takedown

April 13, 2011 Added by:Headlines

The first quarter of 2011 was also witness to a broad range of attempts to distribute malware, and increased malware levels overall. These attempts included malware sent through Facebook chat, or which used other wellknown brand-names such as T-Online and Xerox...

Comments  (0)

7ce032c184c593a533f07004162c53bb

The Cone of Destruction

April 12, 2011 Added by:Carter Schoenberg

Americans maintain a culture of “get it done in two weeks or it has no value”. Odd that its not training, not more ammunition (antivirus), not better firearms (IDS/IPS), but a change in our culture regarding security and technology that will save us from our own cone of destruction...

Comments  (0)

634ff692af43fd4dc5dab3b8590c77d6

Parallelized Data Mining Security

April 12, 2011 Added by:K S Abhiraj

Problems with protecting hosts from malicious code are understood. The problem posed by malicious hosts to entities and the environment is more complex. Since an entity is under the control of the executing host, the host can in principle do anything to the event and its code...

Comments  (2)

A7290c5bd7bc2aaa7ea2b6c957ef639b

FTC Privacy Enforcement and the Google Buzz Settlement

April 12, 2011 Added by:David Navetta

Now is the time to review your company’s privacy and information security practices, conduct an security assessment, and take steps to ensure that your company’s practices comply with the various privacy and information security requirements, including FTC guidance...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Adobe Confirms Another Flash Player Zero Day Bug

April 12, 2011 Added by:Headlines

This vulnerability could allow an attacker to take control of the affected system. There are reports that this vulnerability is being exploited in the wild in targeted attacks via a Flash file embedded in a Microsoft Word file delivered as an email attachment...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Analysis Shows Firewalls Fail to Deliver as Promised

April 12, 2011 Added by:Headlines

Three of the six firewalls failed to stay operational when subjected to stability tests, five out of six didn't handle what is known as the Sneak ACK attack. According to NSS Labs, the performance claims presented in the vendor datasheets are generally grossly overstated...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Microsoft Slams Google Over FISMA Certification Claims

April 12, 2011 Added by:Headlines

"Google can’t be under the misimpression that FISMA certification for Google Apps Premier also covers Google Apps for Government. If that were the case, then why did Google, according to the attachments in the DOJ brief, decide to file a separate FISMA application?"

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Mobile Application Security - Separating Hype From Reality

April 12, 2011 Added by:Rafal Los

Everyone is to blame for the hype around mobile application security. The media is to blame for creating an insane amount of fear, security professionals and vendors are to blame for perpetuating this fear, and end-users are to blame for buying the craziness wholesale without doing research...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

Security Provider Barracuda Networks Hit by SQL Injection

April 12, 2011 Added by:Headlines

The website of application security vendor Barracuda Networks was compromised by a SQL injection attack. The attack appears to have exposed confidential information regarding Barracuda's business partners as well as network login credentials of several employees...

Comments  (0)

10e258c8d23d441b915c1b2333b6996a

HIPAA-HITECH Compliance Free Webinar Series

April 12, 2011 Added by:Jack Anderson

We held the first HIPAA-HITECH Compliance webinar on April 6 with gratifying results. A smart, interested group registered, attended, and asked great questions. This has encouraged us to continue the series. Space is limited for these FREE webinars, so reserve your seat now...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Texas Exposes 3.5 Million Resident's Private Information

April 12, 2011 Added by:Headlines

The records contained the names and mailing addresses of individuals, Social Security numbers, and to varying degrees also contained other information such as dates of birth or driver’s license numbers...

Comments  (0)

6648b1abd4a9b964566c3690613f20a6

Webapp Scanner Review: Acunetix Versus Netsparker

April 11, 2011 Added by:Mark Baldwin

Review: Two companies have developed commercial webapp scanners that rival the features, the speed, the usability and the accuracy of any commercial tool on the market. And they do it at a price point that just about any small business or independent consultant can afford...

Comments  (5)

B451da363bb08b9a81ceadbadb5133ef

What the Epsilon Data Breach Means To You

April 11, 2011 Added by:Alexander Rothacker

Organizations rely on third party providers for numerous responsibilities and often treat them as an extension of their organization. Allowing third party access to ANY information should REQUIRE that they provide the most stringent security measures...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

She Blinded Me With Infosec...

April 11, 2011 Added by:Infosec Island Admin

One must admit that no matter how many times an assessment is carried out and things are found/exploited there are ALWAYS more vulnerabilities being introduced. You will never get them all and the client, if they understand this, will become inured to it...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Digital Certificates Only Provide the Illusion of Security

April 11, 2011 Added by:Headlines

“Right now, it's just an illusion of security. Depending on what you think your threat is, you can trust it on varying levels, but fundamentally, it has some pretty serious problems..."

Comments  (0)


« First < Previous | 290 - 291 - 292 - 293 - 294 | Next > Last »