Video: Cyber attack simulation

Video: Cyber attack simulation


Video: Cyber attack simulation

Posted: 17 Feb 2010 03:27 PM PST

In the video below you can watch CNN's Jeanne Meserve reports on the results a staged cyber attack. ...

Spam recycling: Why fix it if it ain't broken?

Posted: 17 Feb 2010 11:07 AM PST

Why take the trouble and waste the time for writing a new email, when the first one did so well? In the latest spam campaign hitting inboxes around the world, cyber criminals are trying to trick r...

Finalists announced for the "Most Innovative Company at RSA Conference 2010" contest

Posted: 17 Feb 2010 10:55 AM PST

RSA Conference announced the top 10 finalists for its "Most Innovative Company at RSA Conference 2010" contest. This half-day interactive program is devoted to highlighting technological breakthroughs...

12 tips to ensure company data is kept private

Posted: 17 Feb 2010 10:43 AM PST

Companies must consider the implications of using free communications services (such as email and data hosting) on their data privacy. Network Box offers IT managers steps to follow to ensure that...

Mock cyber attack shows US unpreparedness

Posted: 17 Feb 2010 10:29 AM PST

During the simulated cyber attack that took place yesterday in Washington and was recorded by the CNN, one thing became clear: the US are still not ready to deflect or mitigate such an attack to an ex...

A closer look at System Surveillance Pro 5.5

Posted: 17 Feb 2010 07:33 AM PST

System Surveillance Pro logs keystrokes, monitors applications, tracks visited websites, records instant message conversations and captures screenshots of the computer desktop. The installation pro...

Global network of infected devices unearthed

Posted: 17 Feb 2010 06:06 AM PST

While working on a project for the Ministry of Defense, a team of Czech researchers has discovered a global network of virus-infected devices that makes it possible to redirect the flow of information...

Exploring the boundaries of IT security

Posted: 17 Feb 2010 03:19 AM PST

As Niels Bohr once said, prediction is difficult, especially about the future. Nevertheless, almost all network security companies try to assess risk and the potential impact of criminal behavior, fra...

Permanent Stakeholders’ Group of top security advisors appointed

Posted: 17 Feb 2010 03:01 AM PST

As of today, a new composition of 30 top security experts start their term of office as members of the Permanent Stakeholders' Group (PSG), giving advice to the EU's 'cyber security' Agency ENISA-the ...

0 comments:

Post a Comment