Government agents following suspects on social networks

Government agents following suspects on social networks


Government agents following suspects on social networks

Posted: 15 Oct 2010 09:19 AM PDT

The issue of whether or not government or law enforcement agents are or should be allowed to go "undercover" on social networks is not a new one, but thanks to the Electronic Frontier Foundation, it i...

ZeuS developers up the ante with beefed up variant

Posted: 15 Oct 2010 07:31 AM PDT

ZeuS has for a while now been almost a synonym for banking Trojans of every shape and form. Some say that the attention that the information security community has focused on it and on the the inc...

BlackBerry patches Enterprise Server

Posted: 15 Oct 2010 06:09 AM PDT

A vulnerability in the BlackBerry Attachment Service component of the BlackBerry Enterprise Server could allow a malicious individual to cause buffer overflow errors, leading to a DoS condition or pos...

Requirements of cloud-based network security

Posted: 15 Oct 2010 06:00 AM PDT

While some of the technical underpinnings that make up the cloud's 'secret sauce', are relatively recent innovations, the business case for managing critical IT functions as services – inside or outsi...

Weather forecast: Cloudy with a chance of compliance

Posted: 15 Oct 2010 06:00 AM PDT

If there are constants to every information security conference, they are these: threats are up and the job of the average security professional becomes more demanding every year. At the RSA Conf...

5 tips for protecting against spam attacks

Posted: 15 Oct 2010 05:40 AM PDT

Whether you're at work or at home, spam causes headaches and wastes time, forcing you to trawl through your inbox to work out which mail is legitimate and which is spam. It is annoying, time consuming...

How to protect employees with a web filtering solution

Posted: 15 Oct 2010 04:44 AM PDT

Let's face it, this is not your father's Internet (or, for those of us who first went online in the late 90's, even John Postel's Internet.) As invaluable a tool as the Internet is, as empowering as h...

One in five spam messages comes from the U.S.

Posted: 15 Oct 2010 01:37 AM PDT

Sophos published the latest report into the 'Dirty Dozen' spam-relaying countries, covering the third quarter of 2010. Since the second quarter this year, the spam output from the United States has i...

0 comments:

Post a Comment