Iran government systems to be taken off the Internet for protection

Iran government systems to be taken off the Internet for protection


Iran government systems to be taken off the Internet for protection

Posted: 07 Aug 2012 10:31 AM PDT

Remember when Iran expressed its intention of setting up a national Internet disconnected from the World Wide Web in order to keep its citizens safe from Western ideas and culture? Well, it seems t...

Reuters hack was due to old WordPress version

Posted: 07 Aug 2012 09:18 AM PDT

While the individuals responsible for the recent hijacking of Reuters' blogging platform and one of its Twitter accounts are still unknown, it has emerged that the attackers likely managed to hack the...

Gizmodo hack reveals worrying flaws in data management policies

Posted: 07 Aug 2012 08:15 AM PDT

Mat Honan, the former Gizmodo employee who's personal Twitter account compromise resulted in the temporary hijacking of the tech blog's Twitter account, has revealed how the hackers managed to do it a...

Threats and protection issues of cloud data

Posted: 07 Aug 2012 06:00 AM PDT

Eighty-two percent of organizations already transfer, or plan to transfer, sensitive or confidential data into the cloud environment according to a global study of 4,000 business and IT managers condu...

Burning enterprise authentication issues

Posted: 07 Aug 2012 05:00 AM PDT

Threats keep evolving and are becoming more invasive, targets now go beyond the financial industry and involve any company that has sensitive information - whether its intellectual property, partner o...

Quantum cryptography theory has a proven security defect

Posted: 07 Aug 2012 05:00 AM PDT

Researchers at Tamagawa University, Quantum ICT Research Institute, announced today that they had proved the incompleteness and limit of the security theory in quantum key distribution. They showed th...

Employees targeted with faked emails from payroll services firms

Posted: 07 Aug 2012 03:27 AM PDT

Administrators at companies that outsourced payroll management to outside firms have recently been heavily targeted with malicious emails supposedly coming from those very same companies, warn SANS IS...

GFI MailArchiver 2012 tackles email storage and data leakage

Posted: 07 Aug 2012 03:21 AM PDT

GFI Software announced the availability of GFI MailArchiver 2012 that offers new reporting capabilities to guard against data leakage of sensitive information, such as social security and credit card ...

Malicious Olympic 2012 Android apps spotted

Posted: 07 Aug 2012 03:10 AM PDT

The Olympic Games currently underway in London have proven to be one of the best lures for cyber scammers and other cyber crooks: we've had Olympic-themed spam emails carrying malicious PDFs, bogus Ol...

New version of Palamida's scanning solution for open source projects

Posted: 07 Aug 2012 03:06 AM PDT

Palamida recently announced Enterprise Edition 6, the latest edition of its open source intellectual property and vulnerability risk management product. The new version adds a number of new capabil...

The underground economy of social networks

Posted: 06 Aug 2012 11:30 PM PDT

In a new study, Barracuda Labs analyzed a random sampling of more than 70,000 fake Twitter accounts that are being used to sell fake Twitter followers. They also analyzed some of the people that ar...

WatchGuard XTM 5 Series network security appliances released

Posted: 06 Aug 2012 10:38 PM PDT

WatchGuard released WatchGuard XTM 5 Series network security appliances. Appliance packet filtering increased nearly 40 percent, gateway antivirus is 190 percent faster, IPS is up 220 percent, and ove...

USB with AES 256-bit hardware encryption

Posted: 06 Aug 2012 10:00 PM PDT

Enova Technology announced the Enigma module, a USB encryption solution designed to provide real-time full disk encryption for any USB mass storage class (MSC) drive. Key features: Automatic a...

Critical Watch releases countermeasure recommendation engine

Posted: 06 Aug 2012 09:00 PM PDT

Critical Watch launched its ACI Recommendation Engine which consolidates multiple disparate data points into a unified view of risks. It's designed to help close the gap between detection and protecti...

0 comments:

Post a Comment