Blog Posts Tagged with "ISP"

7ddc1f3000a13e4dfec28074e9e7b658

The Netherlands Passes Net Neutrality Legislation

May 24, 2012 Added by:Electronic Frontier Foundation

The Netherlands is the first country in Europe to establish a legal framework supporting net neutrality. The law contains language that restricts when ISPs can wiretap users, and limits the circumstances under which ISPs can cut off a subscriber's Internet access altogether...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

U.S. Anti-Botnet Code of Conduct for ISPs Unveiled

March 23, 2012 Added by:Headlines

“Today is an example of the importance of self-regulatory efforts to help improve the safety and performance of the internet. Sustainable solutions to contain bots must include all stakeholders in efforts to detect, prevent, and remediate these threats..."

Comments  (0)

C6b9a422851928980389afe33c48e213

DNSChanger, March 8th and You

February 24, 2012 Added by:Eric Cissorsky

The deadline should be treated as an opportunity for your organization to learn and refine their processes and procedures. Like any other virus outbreak, this requires a coordinated effort between security professionals, systems administrators and other stakeholders...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FCC Prompts ISPs to Adopt Code of Conduct Standards

February 24, 2012 Added by:Headlines

"If we fail to tackle these challenges, we will pay the price in the form of diminished safety, lost privacy, lost jobs, and financial vulnerability – billions of dollars potentially lost to digital criminals," FCC Chairman Julius Genachowski said...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

KPN Hack: Why was Customer Notification Delayed?

February 13, 2012 Added by:Pierluigi Paganini

The login credentials were stored in plain text in the repository that had been exposed, and that is absurd. This is a failure of the basic security procedures that should be recognized internationally, and is an offense for which there should be heavy penalties...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Commercial DDoS Tools Offer a Competitive Advantage

February 13, 2012 Added by:Headlines

With the growing availability of DDoS services being marketed directly to businesses, enterprises may increasingly find themselves under attack from competitors seeking to gain an advantage in the increasingly lucrative Internet marketplace...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

DDoS Attacks: An Excuse to Talk About IPv6 Security

February 10, 2012 Added by:Pierluigi Paganini

The switchover from the existing address protocol IPv4 to IPv6 will give attackers a great opportunity. With the introduction of the protocol a huge quantity of new internet addresses is available, and those addresses could be used as sources for DDoS attacks...

Comments  (0)

01ceb9281b3fb3dbb90c3efbe327717e

How They Do IT: Spam Filters

February 08, 2012 Added by:Alan Woodward

The current volumes of spam email are extraordinary. Between 70% and 80% of all email sent are spam. As none of the current methods described here are completely effective, there is still scope for much further research in this area...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec: Chinese Connection to Attacks on Defense Contractors

January 27, 2012 Added by:Headlines

The data Symantec published reinforces evidence from an earlier investigation conducted by AlienVault, which described an orchestrated sprear-phishing campaign most likely targeting information on US drone technology which utilized malware-infected PDF documents to deliver the Sykipot payload...

Comments  (0)

959779642e6e758563e80b5d83150a9f

The Death of Antivirus Software

January 23, 2012 Added by:Danny Lieberman

Who needs an anti-virus? If I have a solid operating system like Ubuntu 11.10, IP tables, good control of the services on my notebook and practice safe email, why should I add additional layers of content security and feed the Symantec stock price?

Comments  (12)

7ddc1f3000a13e4dfec28074e9e7b658

Mandatory Data Retention, Smart Meter Hacks and Silent SMS

January 23, 2012 Added by:Electronic Frontier Foundation

Silent SMS delivers a text message without the user being aware, but leads to the creation of a log with the cell phone company that reveals what cell phone towers the phone was closest to, revealing the phone’s location to help with tracking...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Last Call for Input on ISP Botnet Intervention Proposal

November 02, 2011 Added by:Headlines

“In our country, we always have this debate whether the government should take a stronger hand or whether market forces are enough. We've run out of time to have that conversation, at least on some level. We have to get something done..."

Comments  (0)

C70bb5cfd0305c9d18312d92f820c321

Balkanizing the Internet

November 01, 2011 Added by:Gabriel Bassett

The internet is really not one contiguous environment. Instead, due to the nature of service contracts and peering agreements, it's a mesh of interconnected information systems. These information systems are already undergoing a balkanization as we speak...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Public/Private Collaboration to Fight Botnet Plague

October 11, 2011 Added by:Headlines

Botnets have increasingly put computer owners at risk. Researchers estimate that about 4 million new botnet infections occur each month. When a computer is infected by a botnet, personal information and communications can be monitored and Internet access can be exploited...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Government Proposes ISP's Notify Victims of Botnets

October 04, 2011 Added by:Headlines

"While security risks on the Internet exist in many areas, one current widely exploited threat comes from `botnets.' Through this Request for Information and any follow-on work, the two Departments aim to reduce the harm that botnets inflict on the nation's computing environment..."

Comments  (0)

Ba5964a1284ac16d4277991e7225699c

Enterprise IT - Surprisingly Repetitive

August 08, 2011 Added by:Jason Remillard

The lines between ‘Internet’ and ‘Enterprise’ are blurry, but I am still amazed at the rapid speed of which this is occurring and the velocity of not just change, but the impact of this change on solutions and integrations for standard equations of IT such as Security...

Comments  (0)

Page « < 1 - 2 > »