Vulns & Alerts
September 01, 2010 Added by:Robert Siciliano
Even if you are protecting your PC and keeping your critical security patches and antivirus definitions updated, there is always a chance that your bank or credit card company may get hacked. With millions of records being compromised every year, consider your data breached!
August 26, 2010 Added by:Katie Weaver-Johnson
From April through July of 2010, the VA has lost 72 BlackBerrys and 34 laptops. Patient information has been sent to the wrong address or mailed incorrectly 441 times. Almost 10,000 breach incidents in 3 months. What is wrong with this picture?
July 30, 2010 Added by:Niels Groeneveld
Management teams prefer to reduce risk and cost. The legislation forces companies to disclose breaches, but does not force companies to find them. Given these circumstances, a possible option to reduce risk is to decrease the chance that security breaches will be found...
June 24, 2010 Added by:Anthony M. Freed
The average cost of an information security event for a small to medium size business (SMB) is $188,242, according to a new report published by Symantec from data collected by Applied Research, and unauthorized access to sensitive data was rated the single greatest threat to corporate viability.
June 24, 2010 Added by:Jack Anderson
What has been suspected now has been confirmed - the cost of data breaches is substantial. Indeed, a report titled "2009 Annual Study: Global Cost of Data Breach" shines a very bright light on the actual cost of activities stemming from more than 100 breach incidents across multiple industry sectors, numerous organizations, and a handful of different countries.
June 24, 2010 Added by:Robert Siciliano
In September 2009, the Obama administration’s Health Information Technology for Economic and Clinical Health (HITECH) Act went into effect, requiring hospitals and other health care organization to beef up client data protections. Despite this, a recent study found that health care data is still hemorrhaging from peer to peer networks.
June 19, 2010 Added by:Brent Huston
I interact with a lot of people and organizations that have compromised machines. Often, my email or phone call is the first they have heard of the problem. Should you ever get a call like this from me or someone else, here are a few tips that you might find helpful for proceeding.
June 15, 2010 Added by:shawn merdinger
Earlier this month, several reports about the death of Janice Hall, a Red Wing, Minnesota woman came to light. Specifically, she died in an ambulance as a result of a software failure in the oxygen delivery system caused the system to abruptly shutdown. Apparently, the ambulance EMTs did not notice that the oxygen system had quit for a number of minutes, and thus Janice Hall unfor...
June 14, 2010 Added by:Mark Gardner
Over the past few days, security vulnerabilities have gained prominent attention on two of the biggest companies in the USA, if not the world. One was with AT & T and the other with Microsoft. In the case of the AT & T the vulnerability was exposed following a disclosure by a “hacking group” named as Goatse Security. This disclosure led to exposing of approximately 1...
June 08, 2010 Added by:Ron Lepofsky
Here’s a glaring example of how recreational online gaming of any sort can lead to unintentional expense and headache. On May 27, Angela Moscaritolo at SC Magazine wrote an article about Symantec having discovered a database server hosting the stolen credentials of 44 million accounts belonging to at least 18 gaming websites.
May 26, 2010 Added by:Peter Abatan
Over the weekend in the UK it was revealed that the Queen’s address to parliament was leaked through unknown sources. Labour former Cabinet Office minister Tom Watson in his criticism of the leak said “The leaking of the Queen’s Speech is a huge embarrassment for Parliament and the Palace”. What we don’t know is if the document leaked was paper based or electroni...
May 26, 2010 Added by:Eli Talmor
More money is now being made from cybercrime than the billions that come from drug trafficking, AT&T's Chief Security Officer Edward Amoroso has told a US Senate Commerce Committee. Some $1 trillion annually is being siphoned off by cyber criminals according to the security chief.
May 25, 2010 Added by:dgonzalez
IT professional or not, surely you have come across copiers. You know the ones most organizations have now a days. Those multi-function devices that print, scan, copy, fax, email, staple, punch holes and make egg omelets…ok maybe no omelets, but you get the point. They are feature rich and each one of those features come with a price. While you don’t necessari...
May 13, 2010 Added by:Daniel Kennedy
Refusing to maintain and follow a good termination checklist that walks through what access rights to decommission when someone leaves your company can put the brakes on your customers’ good will. Texas Auto Center in Austin Texas demonstrated the headaches that ensue when in February they left more than 80 customers who financed cars unable to get to school, work, and stuck with c...
May 11, 2010 Added by:Marjorie Morgan
The lack of software quality or assurance in the products we use within our tech infrastructure. There are simply too many vulnerabilities out there to exploit; this is the underlying heart to most of the problems we face. It allows hackers, criminals or nation states to attack the confidentiality of our information or even the integrity of our information.
Amphion Forum Highlights Promise and Problem... frigo maxx on 10-01-2014
Find Security That Oursources Badly!... frigo maxx on 10-01-2014
Patch for ShellShock ASAP!... frigo maxx on 10-01-2014