Cisco Security Advisory: Vulnerability in Cisco WebEx Meeting Manager ActiveX Control
Three months in jail for UN email hacker
Firewall Revisited: New Tools Automate Management - 9/2/2008 5:45:00 PM Firewall management tools handle previously manual tasks and eventually could become part of enterprise security management products
Bank's Lost Backup Tapes Contained IDs of 12 Million Clients - 8/29/2008 3:00:00 PM Headcount for Bank of New York Mellon's lost backup tapes rises from 4.2 million to 12 million personal identities
MBTA Flaw Disclosure: The Students Speak Up
Zack Anderson, one of three MIT students who successfully exploited flaws in the Massachusetts transit authority's ticketing system, says they were right to disclose the problem, but that miscommunication was an issue. A CSO exclusive interview.
Read more
The See-Through Skyscraper (7 World trade Center w/Pic)
cityroom.blogs.nytimes.com — Once in a while, when the light and the angles are just right, a skyscraper can come close to vanishing. That happened last Thursday, when the 52 floors of 7 World Trade Center faded into the cloud-flecked blue of a late summer afternoon. Its masonry neighbors (140 West Street and 90 West Street) stood out in contrast. More… (Odd Stuff)
Tech Staff Admit They'd Steal Secrets If Laid Off
A survey reports 88 percent of IT staff would take sensitive company information with them when dismissed.
The Number of Machines Controlled by Botnets Has Jumped 4x in Last 3 Months
Malicious sites pretending to be for hurricane relief: Gustav Part IV - last list
Software to Facilitate Retail Tax Fraud
Interesting
"One-Character Patch" for DNS? Not so fastNews Brief, 2008-08-29Changing a single character in domain-name service (DNS) software could make cache-poisoning attacks harder, but it still leaves problems.
U.S. to deploy DNS Security in two years
The U.S. government issued a memo last week mandating that all major agencies adopt a proposed technology to enable trusted lookups of domain information by December 2009.
Botnets activity saw sudden, unexplained surge over summer
There's no sign of a new major phishing scheme or email-based malware assault, but that hasn't stopped the total number of botnet-controlled systems from ballooning over the summer. This could have been caused by college and high school students with too much time on their hands, or could signal that the malware industry has widely embraced SQL injection.
September 03, 2008 - 07:05AM CT - by Joel Hruska
Appeals court smacks down judge for relying on Wikipedia
In an appeal of an immigration court decision, the US Court of Appeals for the 8th Circuit finds that Wikipedia's approach to community knowledge leaves it an unreliable source of information for legal matters.
September 02, 2008 - 08:15PM CT - by John Timmer
Hundreds of Skype Accounts Hacked
Hundreds of people reported to Skype that their accounts had been hacked. The victims either couldn't log in anym...[ more >> ]
Apple: 'Let's Rock' on September 9
Jason D. O'Grady: Apple has sent out media invitations for a special event next week. Time to speculate on what the announcements will be!
Chrome vulnerable to carpet-bombing flaw
Ryan Naraine: Google's shiny new Web browser is vulnerable to a carpet-bombing vulnerability that could expose Windows users to malicious hacker attacks.
Yet More Rustock 'News' SpamSeptember 3, 2008
The Rustock spam botnet is again sending spam with false news headlines to entice users.
No One Is Obligated To Take Down Perfectly Legal Content You Don't Like
Harass A Republican, Lose Your Phone
ST. PAUL (CN) - Ramsey County has obtained an emergency order allowing it to order telephone companies to turn over the names and numbers of anyone who makes harassing phone calls during the Republican National Convention, and to cut off those people's phone service, for the purpose of "public safety." The order will expire when the Republican convention ends.
3,400 Ballots Missing in Florida Election: Recount Flips Race
The challenge of securing virtualization operations
I have been very interested in virtualization security since early 2004 and it now seems like it... ...1
...
"... Furthermore, security operations must deal with an environment where servers come into existence and are decommissioned at an accelerated rate. Sine virtualization allows admins to virtually build, rack, run and decommission a server in a matter of minutes, the life cycle of a server becomes shorter. Servers evolve from being enduring and tangible to fleeting and ethereal. How do you troubleshoot or forensically analyze a server that only existed for a day? Where do you find its logs, its configuration?"
Kaminsky flaw prompts DNS server overhaul
One of the companies most at risk from the notorious DNS cache poisoning vulnerability has...
Microsoft Ups Notices to XP Pirates Microsoft is updating its WGA Notifications antipiracy tool to take a harder nagging line against users fingered for running bogus copies of Windows XP Professional. Read more...
New Orleans IT departments brace for Gustav
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment