Twitter to establish information security program

Twitter to establish information security program


Twitter to establish information security program

Posted: 24 Jun 2010 11:15 AM PDT

Social networking service Twitter has agreed to settle Federal Trade Commission charges that it deceived consumers and put their privacy at risk by failing to safeguard their personal information, mar...

Man indicted for hacking and threatening the Vice President

Posted: 24 Jun 2010 11:10 AM PDT

A 45-year-old Blaine, Minnesota man has been indicted in federal court in the District of Minnesota for hacking into his neighbor's wireless Internet system and allegedly posing as the neighbor to mak...

.org becomes first generic TLD protected by DNSSEC

Posted: 24 Jun 2010 10:26 AM PDT

Knowing full well that DNSSEC won't be the silver bullet that will solve the massive problem that is cyber security, but will at least provide protection against man-in-the-middle and cache poisoning ...

Wireshark in the large enterprise

Posted: 24 Jun 2010 10:09 AM PDT

Hansang Bae leads the Network/Application Performance Engineering Team with direct responsibility for Packet Capture Infrastructure at Citi. In the very in-depth video below, he discusses Wireshark. ...

Phishing requires more effort than you might think

Posted: 24 Jun 2010 09:06 AM PDT

When it comes to setting up phishing pages, there are some phishers that make the extra effort. Take those behind the fake Orkut login pages, for example. Symantec has been following their work, an...

IT pros expect network threats to increase as budgets decline

Posted: 24 Jun 2010 08:45 AM PDT

Of the 100-plus netForensics survey respondents, 85% believe their organization's security environment will grow more complex over the next 24 months, leading to additional security threats in the sec...

How consumers influence data loss and breaches

Posted: 24 Jun 2010 05:51 AM PDT

Cisco announced the results of a survey exploring the security implications of social networking and the use of personal devices in the enterprise. One of the most striking findings was that employees...

Rogue software details: Sysinternals Antivirus

Posted: 24 Jun 2010 05:34 AM PDT

Sysinternals Antivirus is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\Sysinternals ...

New book: Network Flow Analysis

Posted: 24 Jun 2010 05:23 AM PDT

Network flow analysis is the art of studying high volume network traffic. Rather than capture every single packet, flow analysis allows network administrators to selectively record and filter network ...

WhiteHat Sentinel: SaaS website vulnerability management

Posted: 24 Jun 2010 12:14 AM PDT

WhiteHat Security updated WhiteHat Sentinel, its software-as-a-service (SaaS) website vulnerability management offering, including new User and Role Management options, additional enterprise reports a...

0 comments:

Post a Comment