Will the DHS receive authority over private sector networks?

Will the DHS receive authority over private sector networks?


Will the DHS receive authority over private sector networks?

Posted: 19 Nov 2010 07:40 AM PST

A bill that would give the U.S. Department of Homeland Security the power to impose federal cybersecurity standards on private sector companies whose flawless functioning is considered critical to nat...

New type of ATM skimming attacks

Posted: 19 Nov 2010 06:08 AM PST

ATMs in Europe have lately been hit with skimming attacks that are not only effective, but also rather brazen - the criminals have taken to reprogramming the banks' own anti-skimming devices for their...

Sweden to issue international arrest warrant for Wikileaks' spokesman

Posted: 19 Nov 2010 04:59 AM PST

A month after he's been denied a Swedish residence and work permit - most likely because of the rape and molestation accusations that have been been brought up against him by two Swedish women and the...

Whitehat hacker's laptop, cellphones seized and searched

Posted: 19 Nov 2010 04:02 AM PST

The well-known whitehat hacker and security researcher that goes by the handle Moxie Marlinspike has recently experienced firsthand the electronical device search that travelers are sometimes submitte...

Security tips for safer online shopping from mobile devices

Posted: 19 Nov 2010 03:20 AM PST

47% of employees shopping online will use their company-issued mobile devices: notebook computers, tablets or smart phones. "Digital natives"—ages 18-34, the generation that has grown up with the Inte...

Free tool prevents AutoRun-based malware

Posted: 19 Nov 2010 03:12 AM PST

Endpoint Protector launched the free AutoRun Disable tool, a solution designed to prevent malware infections spread through USB ports and other computer interfaces and which require the malicious soft...

You can do everything right and still be a security attack victim

Posted: 19 Nov 2010 03:01 AM PST

More organizations now rate information security an upper level priority compared to two years ago, according to a study by CompTIA. But that good news is offset by bad news. Many companies continu...

Most common malware detected on Macs

Posted: 18 Nov 2010 06:27 AM PST

Recently Sophos launched its free Mac anti-virus for home users which now has 150,000 active users and Sophos has analyzed the most commonly encountered malware that Mac users are seeing. The top...

Fake documents sold on Facebook

Posted: 18 Nov 2010 06:09 AM PST

I never thought I would see a page like this on Facebook, but I guess I shouldn't be too surprised: "We offer only original high-quality fake passports, driver's licenses, ID cards, stamps and ot...

New Google service could be a godsend to scammers

Posted: 18 Nov 2010 05:49 AM PST

The Instant Previews service that Google launched last week allows users to click on the magnifying glass icon next to a result's title or on its background in order to see a preview of that result. ...

Curiosity fuels Chatroulette and Facebook scam

Posted: 18 Nov 2010 05:27 AM PST

Another scam taking advantage of the curiosity of users is spreading on Facebook. This time, the lure is a supposedly embarrassing and disgusting chance meeting between father and daughter on Chatroul...

Online backup Mozy 2.0 for Mac released

Posted: 18 Nov 2010 05:10 AM PST

Mozy 2.0 for Mac is now available. With improved features and a native-Mac experience, it makes it easier and faster for Mac users to run and monitor backups and restores – whether they're using MozyP...

Cloud-based crack of SHA-1 passwords is a taste of things to come

Posted: 18 Nov 2010 04:54 AM PST

Reports that a German hacker has successfully cracked a secure hashing algorithm (SHA-1) password using a pay-as-you-use cloud computing based parallel processing environment is worrying. "It's w...

Vast majority of organizations continue to adopt encryption

Posted: 18 Nov 2010 01:30 AM PST

For the first time regulatory compliance has surpassed data breach mitigation as the top reason why organizations deploy encryption technologies, according to Ponemon research. Their report also found...

Dell releases endpoint encryption solution

Posted: 18 Nov 2010 01:00 AM PST

Dell today announced Data Protection | Encryption, a flexible, manageable and auditable endpoint encryption solution. The solution is designed to help companies protect endpoint devices, which serve a...

E-commerce and online gaming phishing attacks surge

Posted: 18 Nov 2010 12:00 AM PST

Phishing attacks through impersonation of e-commerce sites and gaming companies increased significantly year-over-year around the world in the third quarter of 2010, according to IID. Instances whe...

Google Chrome tops "Dirty Dozen" apps list

Posted: 17 Nov 2010 11:30 PM PST

Bit9 unveiled its report of the top applications with reported security vulnerabilities in 2010. Google Chrome placed first on the "Dirty Dozen" list, followed by Apple Safari and Microsoft Office.

Tool finds why specific firewall rules exist in enterprise networks

Posted: 17 Nov 2010 11:00 PM PST

Athena Security released Firewall Rule Tracker, an asynchronous documentation solution for recording the reason why specific firewall rules exist in enterprise networks. While firewalls are widely ...

0 comments:

Post a Comment