Archives
You are currently viewing archive for April 2011
Posted By Carl Engelbrecht

If the machine is compromised this helps how?

"The company also announced Voltage SecureData Web, a new data protection solution that uses the PIE encryption protocol, designed for e-commerce merchants struggling with protecting PAN (primary account number) data exchanged in web-based transactions and reducing PCI DSS audit scope in web applications and infrastructure."

preview.tinyurl.com/3v9b6b3

 
Posted By Carl Engelbrecht

Curious...why now?

"Microsoft will support the FBI in its efforts to combat the Coreflood/Afcore botnet by releasing an out-of-schedule update for its Windows Malicious Software Removal Tool (MSRT)."

preview.tinyurl.com/3ugr79e

 
Posted By Carl Engelbrecht

Very concerning...did the FBI give you a heads up?

"The US authorities are temporarily accessing victims' computers to remove the contaminant from the systems. If a computer infected with the bot tries to contact a command-and-control server, it lands on a server controlled by the FBI, which sends out a kill command. The malicious software is then disabled until the system reboots."

preview.tinyurl.com/6kksh9e

 
Posted By Carl Engelbrecht

Slippery slope...is this necessary?

"The SocialGuard program ties into the Facebook API, but is intended to be transparent. That said, Gable noted that you need to first allow the SocialGuard program to work within Facebook. He added that if there is any attempt to hack a person's password or account, an alert will be sent from SocialGuard. The program will also alert you if there is a malicious link present in a Facebook message or page."

http://preview.tinyurl.com/6eyzg5e

 
Posted By Carl Engelbrecht

"In a fraud alert issued by the Bureau and compiled with the help of FS-ISAC and IC3, the feds explain that twenty such incidents have been identified since March 2010, and that the total attempted fraud amounts to approximately $20 million, but that the actual victim losses are $11 million."

preview.tinyurl.com/3cukng2

 
Posted By Carl Engelbrecht

"Users of security log data are collecting more needles than ever -- but they still feel as though they must comb the haystack to find them, according to a study released yesterday."

preview.tinyurl.com/6hlnjg4

 
Posted By Carl Engelbrecht

Ah, that's a scary thought...pun intended!

"Sleep deprivation is one of the most common forms of mental impairment, as it reduces performance in a variety of cognitive and motor tasks. A new paper has identified what might be the cause of this poor performance: small parts of a mammal's brain appear to go into a sleep-like state while they're otherwise apparently awake. And, in rats, the degree to which the brain is experiencing these tiny episodes of sleep correlates with their decline in performance on a simple task."

preview.tinyurl.com/3zcnard

 
Posted By Carl Engelbrecht

Ah, in a perfect world...something tells me there's going to be money involved!

"But an Open Wireless Movement will also need to do technical work: we need to build new technologies to ensure that people have an easy way to share a portion of their bandwidth without affecting the performance of their own network connections while at the same time ensuring that there is absolutely no privacy downside to running an open wireless network."

preview.tinyurl.com/3pxj6d8

 
Posted By Carl Engelbrecht

Soon to be availible on a device with you...You can run but you can no longer hide!

"The data, including historical speed, has been sold to local and regional governments in the Netherlands to help police set speed traps, Dutch newspaper AD reported here, with a Google translation here. As more smartphones offer GPS navigation service, TomTom has been forced to compensate for declining profit by increasing sales in other areas, including the selling of traffic data."

 preview.tinyurl.com/6389zuw

 
Posted By Carl Engelbrecht

Utilities...what to do?

"A full 40% of executives from electricity firms think their industry is more vulnerable to cyber attacks, according to a new report by McAfee and the Center for Strategic and International Studies (CSIS)."

preview.tinyurl.com/68wdy68

 
Posted By Carl Engelbrecht

"Phishing attacks are far from spread out uniformly over the web. Sixty percent of the attacks occurred against four TLDs: .COM, .NET, .TK, and .CC. Meanwhile 78 per cent of the world’s malicious domain registrations were made in just three TLDs: .COM, .TK, and .NE"

preview.tinyurl.com/4xjppp8

 
Posted By Carl Engelbrecht

Not so shocking to read such news anymore...no?

"He leveraged SQL injection vulnerabilities to access the networks of a number of businesses, including an unnamed online ticket provider in 2007 to steal 360,000 credit card numbers. He also purchased card data over the internet from individuals he believed lived in the United States, Russia and Ukraine."

preview.tinyurl.com/3vbv5pw

 
Posted By Carl Engelbrecht

The full consequences of social networking on business are slow to appear and seem very risky!

"But the social networking activities of all employees, not just highly visible ones or spokespersons, have the potential to cause damage. And it's not only the public's perception of the company at stake when employees engage in social networking; an employee's post, blog, or tweet could potentially give rise to liability for the company on a whole host of grounds."

preview.tinyurl.com/3tlx2xj

 
Posted By Carl Engelbrecht

Yikes!

"Sony has announced the bad news: hackers have your personal data, and they may have your credit card information as well. Now it's time for the questions, such as how much this breach and the bad PR attached to it will hurt Sony, and how long the company knew the data was in the hands of the hackers before sharing that information with customers. While it doesn't look like Sony will be liable in any legal sense for holding back information, this black eye won't soon go away."

preview.tinyurl.com/4x2lfez

 
Posted By Carl Engelbrecht

It's clear the greatest attack vector to the Windows domain are the use of the "other than" Microsoft applications...

"Microsoft has expanded its vulnerability disclosure program to include security bulletins about third-party Windows software as well as its own applications."

preview.tinyurl.com/5tt29fh

 


 
Google

User Profile
Carl Engelbr...
Male
Holly Spring...

 
Archives
 
Visitors

You have 2104518 hits.