Video: Cyber attack simulation |
- Video: Cyber attack simulation
- Spam recycling: Why fix it if it ain't broken?
- Finalists announced for the "Most Innovative Company at RSA Conference 2010" contest
- 12 tips to ensure company data is kept private
- Mock cyber attack shows US unpreparedness
- A closer look at System Surveillance Pro 5.5
- Global network of infected devices unearthed
- Exploring the boundaries of IT security
- Permanent Stakeholders Group of top security advisors appointed
Video: Cyber attack simulation Posted: 17 Feb 2010 03:27 PM PST In the video below you can watch CNN's Jeanne Meserve reports on the results a staged cyber attack. ... |
Spam recycling: Why fix it if it ain't broken? Posted: 17 Feb 2010 11:07 AM PST Why take the trouble and waste the time for writing a new email, when the first one did so well? In the latest spam campaign hitting inboxes around the world, cyber criminals are trying to trick r... |
Finalists announced for the "Most Innovative Company at RSA Conference 2010" contest Posted: 17 Feb 2010 10:55 AM PST RSA Conference announced the top 10 finalists for its "Most Innovative Company at RSA Conference 2010" contest. This half-day interactive program is devoted to highlighting technological breakthroughs... |
12 tips to ensure company data is kept private Posted: 17 Feb 2010 10:43 AM PST Companies must consider the implications of using free communications services (such as email and data hosting) on their data privacy. Network Box offers IT managers steps to follow to ensure that... |
Mock cyber attack shows US unpreparedness Posted: 17 Feb 2010 10:29 AM PST During the simulated cyber attack that took place yesterday in Washington and was recorded by the CNN, one thing became clear: the US are still not ready to deflect or mitigate such an attack to an ex... |
A closer look at System Surveillance Pro 5.5 Posted: 17 Feb 2010 07:33 AM PST System Surveillance Pro logs keystrokes, monitors applications, tracks visited websites, records instant message conversations and captures screenshots of the computer desktop. The installation pro... |
Global network of infected devices unearthed Posted: 17 Feb 2010 06:06 AM PST While working on a project for the Ministry of Defense, a team of Czech researchers has discovered a global network of virus-infected devices that makes it possible to redirect the flow of information... |
Exploring the boundaries of IT security Posted: 17 Feb 2010 03:19 AM PST As Niels Bohr once said, prediction is difficult, especially about the future. Nevertheless, almost all network security companies try to assess risk and the potential impact of criminal behavior, fra... |
Permanent Stakeholders Group of top security advisors appointed Posted: 17 Feb 2010 03:01 AM PST As of today, a new composition of 30 top security experts start their term of office as members of the Permanent Stakeholders' Group (PSG), giving advice to the EU's 'cyber security' Agency ENISA-the ... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment