Review: The Information Diet: A Case for Conscious Consumption

Review: The Information Diet: A Case for Conscious Consumption


Review: The Information Diet: A Case for Conscious Consumption

Posted: 15 Aug 2012 10:16 AM PDT

Author: Clay A. Johnson Pages: 160 Publisher: O'Reilly Media ISBN: 1449304680 Introduction As the amount of information we consume every day rises inexorably, we have to be aware that our...

Sirefef infections explode due to new infection technique

Posted: 15 Aug 2012 08:38 AM PDT

The Sirefef/Zaccess family of Trojans - designed to download other malware, disable the machine's security features, and often make lasting changes to the computer - is usually distributed to unsuspec...

Google ups prizes in Chromium bug bounty program

Posted: 15 Aug 2012 07:39 AM PDT

Since a vulnerability rewards program for open source web browser project Chromium was instituted in early 2010, many vulnerabilities have been found and dealt with, and researchers have been rewarded...

Malware-laden emails target hedge fund managers

Posted: 15 Aug 2012 05:59 AM PDT

A highly targeted spam campaign aimed at hedge and private equity fund managers has recently been spotted by Barracuda Labs researchers. The email looks like it has been forwarded a couple of times...

Rackspace launches OpenStack-based private cloud

Posted: 15 Aug 2012 05:46 AM PDT

Rackspace released the Rackspace Private Cloud, powered by OpenStack – making it simple for companies to install, test and run a multi-node OpenStack based private cloud environment. The software...

Recovery for Linux and UNIX systems

Posted: 15 Aug 2012 04:42 AM PDT

Storix announced System Backup Administrator (SBAdmin) version 8.1, which includes new features and enhancements to simplify system recovery. SBAdmin goes beyond just data backup, providing custom...

Critical vulnerabilities in popular DDoS toolkit exposed

Posted: 15 Aug 2012 02:19 AM PDT

Prolexic Technologies exposed weaknesses in the command and control (C&C) architecture of the Dirt Jumper DDoS Toolkit family that could neutralize would-be attackers. The Dirt Jumper family of toolki...

Organizations lack protocols to protect data in the cloud

Posted: 15 Aug 2012 12:29 AM PDT

While sixty-two percent of survey respondents are leveraging the cloud and/or virtualization, only 33 percent of these organizations test data recovery plans regularly to ensure proper protocols are i...

Huge jump in number of fines for data breaches

Posted: 14 Aug 2012 11:59 PM PDT

The Information Commissioner's Office (ICO) has revealed a huge increase in the number of penalties handed out for organisations in breach of the Data Protection Act. Over the last year, ICO has issue...

Cyber-Ark enhances security of files in-transit

Posted: 14 Aug 2012 11:58 PM PDT

Cyber-Ark Software announced version 7 of its Sensitive Information Management Suite to support secure file exchange environments. The suite isolates sensitive data sent over the Internet, enabli...

0 comments:

Post a Comment