Two more Comodo RAs compromised

Two more Comodo RAs compromised


Two more Comodo RAs compromised

Posted: 30 Mar 2011 10:02 AM PDT

The investigation Comodo has mounted following the recent compromise of one of its Registration Authorities and the issuing of rogue certificates for popular sites has revealed that two additional RAs...

Cisco ACS unauthorized password change vulnerability

Posted: 30 Mar 2011 09:16 AM PDT

A vulnerability exists in some Cisco Secure Access Control System (ACS) versions that could allow a remote, unauthenticated attacker to change the password of any user account to any value without pro...

A closer look at Disk Drill PRO

Posted: 30 Mar 2011 06:00 AM PDT

Disk Drill PRO (v1.2.97) is a Mac data recovery software that recovers data from HFS/HFS+, FAT, NTFS and other file systems. Disk Drill locates and recovers deleted files from any mountable media - ma...

NASA networks open to cyber attacks

Posted: 30 Mar 2011 05:32 AM PDT

Experts from the Office of the Inspector General (OIG) are not satisfied. Their audit of the computer networks on which NASA relies on to carry out its various missions has discovered that despite...

FBI asks public to break a code, help solve a murder

Posted: 30 Mar 2011 04:53 AM PDT

An interesting request for help has been made public yesterday by the FBI: "Cryptanalists, help solve an open murder case". The murder happened back in 1999. 41-year-old Ricky McCormick's dead body...

ICSA Labs reveals electronic health record testing program

Posted: 30 Mar 2011 04:42 AM PDT

ICSA Labs unveiled a new certification program for electronic health record systems and has certified the first three products in two domains under the program. ICSA Labs certified the following ...

Harvest geolocation user info with Creepy

Posted: 30 Mar 2011 04:32 AM PDT

Creepy is an application that allows you to gather geolocation related information about users from social networking platforms and image hosting services. The information is presented in a map ins...

The need for data encryption in the cloud

Posted: 30 Mar 2011 04:18 AM PDT

Recent Microsoft research shows that almost two-fifths of companies will start paying for cloud services within three years. Cloud-using firms need to revisit their encryption needs. According to P...

European Parliament computer network breached

Posted: 30 Mar 2011 03:23 AM PDT

The computer network of the European Parliament has been targeted by a cyber attack that may or may not be linked to the attack against the European Commission and the External Action Service networks...

BP loses laptop with personal data of 13,000 claimants

Posted: 30 Mar 2011 02:50 AM PDT

A laptop containing personal information of some 13,000 people who filed claims for compensation after last year's big oil spill in the Gulf of Mexico has been lost, announced the spokesman of oil gia...

Lifecycle model for managing unknown vulnerabilities

Posted: 30 Mar 2011 12:08 AM PDT

Codenomicon released its Unknown Vulnerability Management (UVM) Lifecycle model, a security assurance process, which focuses on unreported vulnerabilities. The UVM model helps companies and organizati...

0 comments:

Post a Comment