Blog Posts Tagged with "ISP"
May 24, 2012 Added by:Electronic Frontier Foundation
The Netherlands is the first country in Europe to establish a legal framework supporting net neutrality. The law contains language that restricts when ISPs can wiretap users, and limits the circumstances under which ISPs can cut off a subscriber's Internet access altogether...
March 23, 2012 Added by:Headlines
“Today is an example of the importance of self-regulatory efforts to help improve the safety and performance of the internet. Sustainable solutions to contain bots must include all stakeholders in efforts to detect, prevent, and remediate these threats..."
February 24, 2012 Added by:Eric Cissorsky
The deadline should be treated as an opportunity for your organization to learn and refine their processes and procedures. Like any other virus outbreak, this requires a coordinated effort between security professionals, systems administrators and other stakeholders...
February 24, 2012 Added by:Headlines
"If we fail to tackle these challenges, we will pay the price in the form of diminished safety, lost privacy, lost jobs, and financial vulnerability – billions of dollars potentially lost to digital criminals," FCC Chairman Julius Genachowski said...
February 13, 2012 Added by:Pierluigi Paganini
The login credentials were stored in plain text in the repository that had been exposed, and that is absurd. This is a failure of the basic security procedures that should be recognized internationally, and is an offense for which there should be heavy penalties...
February 13, 2012 Added by:Headlines
With the growing availability of DDoS services being marketed directly to businesses, enterprises may increasingly find themselves under attack from competitors seeking to gain an advantage in the increasingly lucrative Internet marketplace...
February 10, 2012 Added by:Pierluigi Paganini
The switchover from the existing address protocol IPv4 to IPv6 will give attackers a great opportunity. With the introduction of the protocol a huge quantity of new internet addresses is available, and those addresses could be used as sources for DDoS attacks...
February 08, 2012 Added by:Alan Woodward
The current volumes of spam email are extraordinary. Between 70% and 80% of all email sent are spam. As none of the current methods described here are completely effective, there is still scope for much further research in this area...
January 27, 2012 Added by:Headlines
The data Symantec published reinforces evidence from an earlier investigation conducted by AlienVault, which described an orchestrated sprear-phishing campaign most likely targeting information on US drone technology which utilized malware-infected PDF documents to deliver the Sykipot payload...
January 23, 2012 Added by:Danny Lieberman
Who needs an anti-virus? If I have a solid operating system like Ubuntu 11.10, IP tables, good control of the services on my notebook and practice safe email, why should I add additional layers of content security and feed the Symantec stock price?
January 23, 2012 Added by:Electronic Frontier Foundation
Silent SMS delivers a text message without the user being aware, but leads to the creation of a log with the cell phone company that reveals what cell phone towers the phone was closest to, revealing the phone’s location to help with tracking...
November 02, 2011 Added by:Headlines
“In our country, we always have this debate whether the government should take a stronger hand or whether market forces are enough. We've run out of time to have that conversation, at least on some level. We have to get something done..."
November 01, 2011 Added by:Gabriel Bassett
The internet is really not one contiguous environment. Instead, due to the nature of service contracts and peering agreements, it's a mesh of interconnected information systems. These information systems are already undergoing a balkanization as we speak...
October 11, 2011 Added by:Headlines
Botnets have increasingly put computer owners at risk. Researchers estimate that about 4 million new botnet infections occur each month. When a computer is infected by a botnet, personal information and communications can be monitored and Internet access can be exploited...
October 04, 2011 Added by:Headlines
"While security risks on the Internet exist in many areas, one current widely exploited threat comes from `botnets.' Through this Request for Information and any follow-on work, the two Departments aim to reduce the harm that botnets inflict on the nation's computing environment..."
August 08, 2011 Added by:Jason Remillard
The lines between ‘Internet’ and ‘Enterprise’ are blurry, but I am still amazed at the rapid speed of which this is occurring and the velocity of not just change, but the impact of this change on solutions and integrations for standard equations of IT such as Security...
Don’t Let Your Guard Down: Tragedies Pave ... shahbaz ocpfsd1 on 04-24-2014
Stopping Remote Access Breaches with “Hone... Pakhi Chopra on 04-24-2014
Interoperability: A Much Needed Cloud Comput... ryan mccarthy on 04-23-2014