Social networking "Bill of Rights" released |
- Social networking "Bill of Rights" released
- Review: Network Security Auditing
- Firefox 3.6.4 fixes several security issues
- Secure social media management
- Twilight app turns mobile phones into zombies
- Basic TCP/IP analysis
- How much is Facebook data worth?
- Teens share alarming amounts of personal info online
- The ultimate Black Hat 2010 party by Qualys
- Online family protection for iPhone, iPod touch and iPad
- Patch management from the cloud
Social networking "Bill of Rights" released Posted: 23 Jun 2010 12:23 PM PDT A little over a month ago, the Electronic Frontier Foundation offered their suggestions about what a social networking "bill of rights" should contain. Last week - after much commenting and writin... |
Review: Network Security Auditing Posted: 23 Jun 2010 10:00 AM PDT Author: Chris Jackson Pages: 528 Publisher: Cisco Press ISBN: 1587053527 Introduction This book is part of the Cisco Press Networking Technology Series, and is aimed at teaching security ... |
Firefox 3.6.4 fixes several security issues Posted: 23 Jun 2010 07:41 AM PDT Mozilla released Firefox 3.6.4 that fixes several security issues as well as stability issues. User tracking across sites using Math.random() Security researcher Amit Klein reported that it was ... |
Secure social media management Posted: 23 Jun 2010 07:24 AM PDT Cyveillance announced the availability of Secure Social Media Management, which provides organizations with professional review and consultation of social media policies and guidelines, as well as pol... |
Twilight app turns mobile phones into zombies Posted: 23 Jun 2010 06:23 AM PDT While not the first one who has thought of demonstrating the ability of using an application to create a botnet of Android-running mobile devices, researcher Jon Oberheide's demonstration at SummerCon... |
Posted: 23 Jun 2010 03:35 AM PDT Hansang Bae leads the Network/Application Performance Engineering Team with direct responsibility for Packet Capture Infrastructure at Citi. In the video below he discusses basic TCP/IP analysis. ... |
How much is Facebook data worth? Posted: 23 Jun 2010 02:42 AM PDT Facebook has over 400 million active users. Can you even imagine how much freely given, highly accurate user data is stored on each of those accounts? The marketing industry sure can, and so can c... |
Teens share alarming amounts of personal info online Posted: 23 Jun 2010 02:00 AM PDT McAfee released "The Secret Life of Teens," a survey that surveyed 955 U.S. 13-17 year olds (including 593 teens ages 13-15 and 362 teens aged 16-17) and reveals the online behavior of American teens ... |
The ultimate Black Hat 2010 party by Qualys Posted: 23 Jun 2010 01:00 AM PDT The Qualys party at Black Hat featuring integration partners will take place at the Jet Mirage Nightclub on Wednesday, July 28, 8PM - 2AM. Dance the night away to Tainted Love (a top 80's cover b... |
Online family protection for iPhone, iPod touch and iPad Posted: 23 Jun 2010 12:30 AM PDT McAfee announced Family Protection iPhone, iPod touch and iPad Edition which provides strong parental controls to keep children safe when they are browsing the Internet on an Apple mobile device. ... |
Patch management from the cloud Posted: 23 Jun 2010 12:00 AM PDT In today's IT world, devices are mobile and the Internet has become the corporate network. The result is additional challenges for IT Managers to keep devices patched and protected. Fiberlink's ... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment