Review: Preventing Good People From Doing Bad Things

Review: Preventing Good People From Doing Bad Things


Review: Preventing Good People From Doing Bad Things

Posted: 11 Jan 2012 07:00 AM PST

Authors: John Mutch and Brian Anderson Pages: 220 Publisher: Apress ISBN: 1430239212 Introduction As the number of known security breaches seemingly rises exponentially with every passing...

Hacks of Chinese sites either inside jobs or faked

Posted: 11 Jan 2012 06:17 AM PST

Last week's news that hacks of a number of high-profile sites resulted in the compromise of personal and financial information of over 100 million Chinese Internet users has been revealed as inaccurat...

The anatomy of the Gameover Zeus variant

Posted: 11 Jan 2012 05:36 AM PST

The "Gameover" malware is a relatively new, "private" version of ZeuS. Support for the distributed command and control (C2) tools, integrated into the ZeuS botnet, were implemented at the request of o...

Easy ways to protect your privacy and data

Posted: 11 Jan 2012 05:25 AM PST

In spite of one high profile computer security breach after another, many people are still not employing even the most basic safeguards to protect their privacy and their data. Defence Intelligence ha...

Dell delivers new storage backup

Posted: 11 Jan 2012 05:18 AM PST

Dell announced advancements in its Fluid Data architecture that enable customers to quickly adapt to the changing demands of their organizations and increase automation for management of their primary...

Google admits profiting from ads for illegal sites

Posted: 11 Jan 2012 04:31 AM PST

You should know by now that the fact that Google is serving you an advertisement does not mean that it's safe to click on it. Time and time again examples of malware being pushed via Google's AdWords ...

Phishing emails from spoofed US-CERT addresses

Posted: 11 Jan 2012 03:12 AM PST

US-CERT has issued a public warning about a phishing email campaign using spoofed US-CERT email addresses. "The subject of the phishing email is: 'Phishing incident report call number: PH000000XX...

Smart network cloud application platform

Posted: 11 Jan 2012 02:03 AM PST

NETGEAR announced its Smart Network Cloud Application Platform, a new technology platform that enables consumers to purchase and download apps from the cloud for their home network to optimize and per...

Splunk Enterprise 4.3 released

Posted: 11 Jan 2012 01:00 AM PST

Splunk Enterprise, a software for collecting, indexing and harnessing machine data, reached version 4.3. "All kinds of companies are using Splunk to harness the value in their machine data. With th...

Key security developments for 2012

Posted: 11 Jan 2012 12:49 AM PST

Kroll Ontrack, the leading provider of data recovery, electronic discovery, and information management products and services, today announced the most important technology trends for the coming year i...

IPAM and DNSSEC key management integration

Posted: 11 Jan 2012 12:34 AM PST

The Thales nShield hardware security module (HSM) is now integrated with the Infoblox DNS platform to enable the deployment of DNSSEC. This joint solution addresses common DNSSEC deployment challenges...

The Linux Command Line

Posted: 11 Jan 2012 12:12 AM PST

Thanks to user-friendly distributions like Ubuntu, more people are running Linux than ever before. But many users stick to the GUI and point and click their way through tasks, missing out on one of th...

0 comments:

Post a Comment