Two more Comodo RAs compromised |
- Two more Comodo RAs compromised
- Cisco ACS unauthorized password change vulnerability
- A closer look at Disk Drill PRO
- NASA networks open to cyber attacks
- FBI asks public to break a code, help solve a murder
- ICSA Labs reveals electronic health record testing program
- Harvest geolocation user info with Creepy
- The need for data encryption in the cloud
- European Parliament computer network breached
- BP loses laptop with personal data of 13,000 claimants
- Lifecycle model for managing unknown vulnerabilities
Two more Comodo RAs compromised Posted: 30 Mar 2011 10:02 AM PDT The investigation Comodo has mounted following the recent compromise of one of its Registration Authorities and the issuing of rogue certificates for popular sites has revealed that two additional RAs... |
Cisco ACS unauthorized password change vulnerability Posted: 30 Mar 2011 09:16 AM PDT A vulnerability exists in some Cisco Secure Access Control System (ACS) versions that could allow a remote, unauthenticated attacker to change the password of any user account to any value without pro... |
A closer look at Disk Drill PRO Posted: 30 Mar 2011 06:00 AM PDT Disk Drill PRO (v1.2.97) is a Mac data recovery software that recovers data from HFS/HFS+, FAT, NTFS and other file systems. Disk Drill locates and recovers deleted files from any mountable media - ma... |
NASA networks open to cyber attacks Posted: 30 Mar 2011 05:32 AM PDT Experts from the Office of the Inspector General (OIG) are not satisfied. Their audit of the computer networks on which NASA relies on to carry out its various missions has discovered that despite... |
FBI asks public to break a code, help solve a murder Posted: 30 Mar 2011 04:53 AM PDT An interesting request for help has been made public yesterday by the FBI: "Cryptanalists, help solve an open murder case". The murder happened back in 1999. 41-year-old Ricky McCormick's dead body... |
ICSA Labs reveals electronic health record testing program Posted: 30 Mar 2011 04:42 AM PDT ICSA Labs unveiled a new certification program for electronic health record systems and has certified the first three products in two domains under the program. ICSA Labs certified the following ... |
Harvest geolocation user info with Creepy Posted: 30 Mar 2011 04:32 AM PDT Creepy is an application that allows you to gather geolocation related information about users from social networking platforms and image hosting services. The information is presented in a map ins... |
The need for data encryption in the cloud Posted: 30 Mar 2011 04:18 AM PDT Recent Microsoft research shows that almost two-fifths of companies will start paying for cloud services within three years. Cloud-using firms need to revisit their encryption needs. According to P... |
European Parliament computer network breached Posted: 30 Mar 2011 03:23 AM PDT The computer network of the European Parliament has been targeted by a cyber attack that may or may not be linked to the attack against the European Commission and the External Action Service networks... |
BP loses laptop with personal data of 13,000 claimants Posted: 30 Mar 2011 02:50 AM PDT A laptop containing personal information of some 13,000 people who filed claims for compensation after last year's big oil spill in the Gulf of Mexico has been lost, announced the spokesman of oil gia... |
Lifecycle model for managing unknown vulnerabilities Posted: 30 Mar 2011 12:08 AM PDT Codenomicon released its Unknown Vulnerability Management (UVM) Lifecycle model, a security assurance process, which focuses on unreported vulnerabilities. The UVM model helps companies and organizati... |
You are subscribed to email updates from Help Net Security - News To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment