Vulns & Alerts

5a432ca05467666d90425b7b869c5003

Stolen Gaming Credentials can cost Big Bucks!

June 08, 2010 Added by:Ron Lepofsky

Here’s a glaring example of how recreational online gaming of any sort can lead to unintentional expense and headache. On May 27, Angela Moscaritolo at SC Magazine wrote an article about Symantec having discovered a database server hosting the stolen credentials of 44 million accounts belonging to at least 18 gaming websites.  

Comments  (0)

72cc4c5e6cbde70aa374bf94076ad722

Even “Her Majesty, The Queen” could do with Information Rights Management

May 26, 2010 Added by:Peter Abatan

Over the weekend in the UK it was revealed that the Queen’s address to parliament was leaked through unknown sources. Labour former Cabinet Office minister Tom Watson in his criticism of the leak said “The leaking of the Queen’s Speech is a huge embarrassment for Parliament and the Palace”. What we don’t know is if the document leaked was paper based or electroni...

Comments  (2)

7af56c65866a442699d6dd1dfb02b528

How to deal with failure to keep the bad guys out.

May 26, 2010 Added by:Eli Talmor

More money is now being made from cybercrime than the billions that come from drug trafficking, AT&T's Chief Security Officer Edward Amoroso has told a US Senate Commerce Committee. Some $1 trillion annually is being siphoned off by cyber criminals according to the security chief.

Comments  (0)

Dba00ace283759a06b07f9ae2f6b0751

The Scary Truth about Copiers

May 25, 2010 Added by:dgonzalez

IT professional or not, surely you have come across copiers. You know the ones most organizations have now a days. Those multi-function devices that print, scan, copy, fax, email, staple, punch holes and make egg omelets…ok maybe no omelets, but you get the point. They are feature rich and each one of those features come with a price. While you don’t necessari...

Comments  (15)

B426b30042abbc15e363cb679bbc937d

Bad Password Management Will Stop You in Your Tracks

May 13, 2010 Added by:Daniel Kennedy

Refusing to maintain and follow a good termination checklist that walks through what access rights to decommission when someone leaves your company can put the brakes on your customers’ good will. Texas Auto Center in Austin Texas demonstrated the headaches that ensue when in February they left more than 80 customers who financed cars unable to get to school, work, and stuck with c...

Comments  (0)

509ea0c1f4a210534eb004d35c10aa2d

ISAlliance on Finance Sector Cybersecurity

May 11, 2010 Added by:Marjorie Morgan

The lack of software quality or assurance in the products we use within our tech infrastructure. There are simply too many vulnerabilities out there to exploit; this is the underlying heart to most of the problems we face. It allows hackers, criminals or nation states to attack the confidentiality of our information or even the integrity of our information.

Comments  (0)

E376ca757c1ebdfbca96615bf71247bb

The Need to Develop Security Guidelines For Medical Devices

May 10, 2010 Added by:shawn merdinger

In the April 2010 issue of New England Journal of Medicine, William Maisel and Tadayoshi Kohno state that “medical-device manufacturers have a legal responsibility to be vigilant and responsive to security threats, although their specific responsibilities have not been well delineated.”

Comments  (1)

E66d48d7b227e7845b73d43eb1a06fcb

The cyber-gangsters' "weapons" and the state of Internet security

May 10, 2010 Added by:Roman Zeltser

Writing an article about Chinese hackers (all 3 parts were published here - please use the search to find them) I had to explain why it's difficult to fight against them due to a wide range of tools, methods and existing vulnerability of operating systems and applications in addition to the specific political conditions in China. Since this material turned to more than 15-page informati...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Seven Scary Cyber Scenarios

May 09, 2010 Added by:Richard Stiennon

Scenario planning is an important tool in the realm of cyber security.  Stakeholder teams are assembled to create plausible scenarios of possible future threats. Repercussions are predicted to help quantify risk and justify mitigating investments in technology and changes to policy and operations.

Comments  (1)

E66d48d7b227e7845b73d43eb1a06fcb

Should we be afraid of Chinese hackers? ...Or lost cyber war (Part III)

May 04, 2010 Added by:Roman Zeltser

In addition to the full access to Windows OS that proved to be vulnerable to endless exploits, China chooses FreeBSD as basis for secure OS. The Washington Times recently reported that "China has developed more secure operating software for its tens of millions of computers and is already installing it on government and military systems, hoping to make Beijing's networks impenetrable to U.S. ...

Comments  (5)

694eabca410cc15c81fab9dc514a629e

Would you like to meet an Identity Thief?

May 03, 2010 Added by:Bruno Pavlicek

Much has been written on the topic of Identity Theft. But what do we really know about the identity thieves themselves. Who are they? How do they operate? What motivates them? To begin with, one needs to appreciate that America is plagued with an endless epidemic of identity theft.

Comments  (3)

E66d48d7b227e7845b73d43eb1a06fcb

Should we be afraid of Chinese hackers? ...Or lost cyber war. (Part II)

May 03, 2010 Added by:Roman Zeltser

Internet users in China aged below 25 spend on average 50 percent of their leisure time online, according to this survey. Those surveyed in China demonstrated high levels of social media activity. Nearly 9 out of 10 Chinese respondents indicated that they actively read or contribute to blogs and 85 percent said they participate in chat rooms.

Comments  (2)

37d5f81e2277051bc17116221040d51c

Google Hack Whacks Passwords

April 30, 2010 Added by:Robert Siciliano

Code named Gaia after “Greek Goddess of Earth” a Google single sign on password system was hacked in December. Google is a significant part of many individuals and businesses online activities. Millions rely on Google every day to be fast, functional and most important, secure. A breach such as this may erode the confidence of Google users, but for many, they have all their egg...

Comments  (2)

E376ca757c1ebdfbca96615bf71247bb

Chisco: Welcome To The Hunan Network?

April 23, 2010 Added by:shawn merdinger

On NPR's 'Fresh Air' this week, Richard Clarke made some great points, in particular with the logic bomb scenarios of sneaking in code and untrustworthy hardware. While this is old news, it's still a very real threat -- recall that Chisco devices were discovered on US government networks and disclosed back in 2008.

Comments  (0)

6d117b57d55f63febe392e40a478011f

An Interview with U.N. Cybersecurity Expert Raoul Chiesa

April 15, 2010 Added by:Anthony M. Freed

I recently had the pleasure of talking with Raoul Chiesa, OPST, OPSA, and ISECOM Trainer, about international perspectives on cybersecurity issues. Mr. Chiesa is a Senior Advisor on Strategic Alliances & Cybercrime Issues at the Global Crimes Unit for the United Nations Interregional Crime & Justice Research Institute, a Member of the Permanent Stakeholders Group at the European Network &a...

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

FaaS: Fraud as a Service

April 14, 2010 Added by:Mike Meikle

In working with various clients on the topic of security, a common theme has emerged. Management and employees still labor under the perception that fraud is still the purview of unorganized individuals with an axe to grind against a specific company. 

Comments  (0)

Page « < 18 - 19 - 20 - 21 - 22 > »