Twitter to establish information security program |
- Twitter to establish information security program
- Man indicted for hacking and threatening the Vice President
- .org becomes first generic TLD protected by DNSSEC
- Wireshark in the large enterprise
- Phishing requires more effort than you might think
- IT pros expect network threats to increase as budgets decline
- How consumers influence data loss and breaches
- Rogue software details: Sysinternals Antivirus
- New book: Network Flow Analysis
- WhiteHat Sentinel: SaaS website vulnerability management
Twitter to establish information security program Posted: 24 Jun 2010 11:15 AM PDT Social networking service Twitter has agreed to settle Federal Trade Commission charges that it deceived consumers and put their privacy at risk by failing to safeguard their personal information, mar... |
Man indicted for hacking and threatening the Vice President Posted: 24 Jun 2010 11:10 AM PDT A 45-year-old Blaine, Minnesota man has been indicted in federal court in the District of Minnesota for hacking into his neighbor's wireless Internet system and allegedly posing as the neighbor to mak... |
.org becomes first generic TLD protected by DNSSEC Posted: 24 Jun 2010 10:26 AM PDT Knowing full well that DNSSEC won't be the silver bullet that will solve the massive problem that is cyber security, but will at least provide protection against man-in-the-middle and cache poisoning ... |
Wireshark in the large enterprise Posted: 24 Jun 2010 10:09 AM PDT Hansang Bae leads the Network/Application Performance Engineering Team with direct responsibility for Packet Capture Infrastructure at Citi. In the very in-depth video below, he discusses Wireshark. ... |
Phishing requires more effort than you might think Posted: 24 Jun 2010 09:06 AM PDT When it comes to setting up phishing pages, there are some phishers that make the extra effort. Take those behind the fake Orkut login pages, for example. Symantec has been following their work, an... |
IT pros expect network threats to increase as budgets decline Posted: 24 Jun 2010 08:45 AM PDT Of the 100-plus netForensics survey respondents, 85% believe their organization's security environment will grow more complex over the next 24 months, leading to additional security threats in the sec... |
How consumers influence data loss and breaches Posted: 24 Jun 2010 05:51 AM PDT Cisco announced the results of a survey exploring the security implications of social networking and the use of personal devices in the enterprise. One of the most striking findings was that employees... |
Rogue software details: Sysinternals Antivirus Posted: 24 Jun 2010 05:34 AM PDT Sysinternals Antivirus is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\Sysinternals ... |
New book: Network Flow Analysis Posted: 24 Jun 2010 05:23 AM PDT Network flow analysis is the art of studying high volume network traffic. Rather than capture every single packet, flow analysis allows network administrators to selectively record and filter network ... |
WhiteHat Sentinel: SaaS website vulnerability management Posted: 24 Jun 2010 12:14 AM PDT WhiteHat Security updated WhiteHat Sentinel, its software-as-a-service (SaaS) website vulnerability management offering, including new User and Role Management options, additional enterprise reports a... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment