How do we defend the Internet of the future?

How do we defend the Internet of the future?


How do we defend the Internet of the future?

Posted: 15 Sep 2010 08:30 AM PDT

As the Internet evolves, it will offer a vast array of possibilities such as new types of health services, personalized and mixed reality entertainment, and more. With new options inevitably come new ...

ZBot removal tool

Posted: 15 Sep 2010 08:18 AM PDT

ZBot (also known as Zeus, ZeusBot or WSNPoem) is a Trojan engineered to steal sensitive data from compromised computers. While ZBot focuses mainly on the online banking details that users input on ...

NPF: NetBSD's new packet filter

Posted: 15 Sep 2010 08:12 AM PDT

The NetBSD Foundation announced NPF, a new packet filter designed for high performance on multiprocessor machines, and for easy extensibility. Highlights of NPF features include:MP-safety and loc...

Google fixes security issues in Chrome

Posted: 15 Sep 2010 05:59 AM PDT

Google Chrome 6.0.472.59 has been released to the Stable and Beta channels for Windows, Mac, and Linux. Security fixes:High use-after-free when using document APIs during parse.High use-after-fre...

Inside backup and storage: The expert's view

Posted: 15 Sep 2010 03:05 AM PDT

How much data do we create? How do we secure it? Store it? Retrieve it? When professional community Wikibon recently translated the amount of digital information that is estimated to be created in ...

Cloud security challenges and adoption

Posted: 15 Sep 2010 02:30 AM PDT

Jim Reavis is the Executive Director of the Cloud Security Alliance. In this interview he talks about cloud security challenges, cloud computing adoption in the enterprise as well as the recently anno...

Google engineer abuses power, violates privacy of minors

Posted: 15 Sep 2010 01:57 AM PDT

A Google Site Reliability Engineer was fired in July after an internal investigation by the company that confirmed that he violated the privacy of several underage users. David Barksdale, the fired...

Top security technologies that stem data breaches

Posted: 15 Sep 2010 01:48 AM PDT

Securosis announced the findings of a comprehensive independent data security survey of more than 1100 multinational IT security practitioners. The survey focused on uncovering what technologies secur...

F-Secure Internet Security 2011 released

Posted: 15 Sep 2010 01:39 AM PDT

F-Secure Internet Security 2011 has been designed to be non-intrusive. This means the product only asks for the user's attention when it's really necessary. The user interface is reassuringly simple a...

0 comments:

Post a Comment