-
pulsing zombie
A pulsing zombie is a computer whose security has been compromised without its owner's knowledge by a cracker so that it intermittently carries out a denial-of-service attack on target computers in...30 Oct 2009
-
US-CERT warns of BlackBerry snooping software
PhoneSnoop can configure the BlackBerry speakerphone to function as a listening device for a remote hacker.29 Oct 2009
-
Mini guide: How to remove and prevent Trojans, malware and spyware
Organizations need to learn how to implement proper protections and understand best practices for malware defense in order to keep their network environments secure. In this mini guide you will lea...29 Oct 2009
-
Kaspersky system analyzes malicious URLs on Twitter for malware
Kaspersky Krab Krawler analysis finds users fueling the number of malicious links on Twitter by posting URLs to infected websites.29 Oct 2009
-
Information Security Decisions 2009: Presentation downloads
Did you miss Information Security Decisions 2009, or just want to review your favorite presentations? This is the place to download talking points from Joel Snyder, Eric Holmquist, Rich Mogull and ...29 Oct 2009
-
Marcus Ranum on cyberwarfare, infosec careers
At 2009's Information Security Decisions conference, security expert Marcus Ranum sat down to answer some of readers' security questions.29 Oct 2009
-
Bruce Schneier on outsourcing, awareness training
At the 2009 Information Security Decisions conference, security expert Bruce Schneier answered some of readers' burning security questions.29 Oct 2009
-
Chip and PIN adoption serves lesson for U.S. payment industry
As payment processors offer plans for end-to-end encryption, the UK is finding success with chip and pin deployments. The U.S. payment industry should take notice, expert says.29 Oct 2009
-
Silon malware intercepts Internet Explorer sessions, steals credentials
A new malware variant called Silon has been has been associated with attacks against large banks, according to an advisory issued by Trusteer researchers.28 Oct 2009
-
Researchers find thousands of flawed embedded devices
Columbia University researchers found thousands of devices, from home routers to video conferencing units at risk. They say their research has implications for enterprises.28 Oct 2009
-
Breach prevention: How to keep track of data and applications
The well-known Heartland Payment Systems breach demonstrates the importance of data security. Michael Cobb reviews which tools best monitor a company's valuable enterprise applications and keep tra...28 Oct 2009
-
LDAP signing requirements for various directory configurations
While there is no longer a standard directory configuration, it is still possible to implement LDAP signing in most environments. Learn more about LDAP signing requirements from IAM expert Randall ...28 Oct 2009
-
Cisco acquires SaaS security vendor ScanSafe
Cisco said the move would complement its line of IronPort appliances by offering customers Web security gateway services in the cloud.27 Oct 2009
-
Pushdo botnet uses Facebook to spread malicious email attachment
A phony message warns users that their Facebook password has been reset.27 Oct 2009
-
Group to shed light on secure identity management threats
Identity management technologies are struggling to keep pace with constantly evolving nature of attacks, according to the Center for Applied Identity Management Research (CAIMR).27 Oct 2009
-
Screencast: How to launch an OpenVAS scan
In this screencast, Peter Giannoulis demonstrates the OpenVAS Linux/Unix-based assessment and penetration testing tool.27 Oct 2009
-
Heartland CIO is critical of First Data's credit card tokenization plan
First Data Corp. uses RSA software for tokenization, providing a possible threat vector for attackers, says Heartland CIO Steven Elefant.26 Oct 2009
-
Heartland CIO on end-to-end encryption, credit card tokenization
Steven Elefant, CIO of Princeton, NJ-based Heartland Payment Systems Inc., is leading development on the payment processor's E3 end-to-end encryption plan and new secure payment terminals. Elefant,...26 Oct 2009
-
Can malware source code be used to stop a virus or worm?
Source code is a valuable tool to stop malware, and it can make malicious code analysis more effective and successful.25 Oct 2009
-
micro-botnet (mini-botnet or baby botnet)
A micro-botnet, also called a mini-botnet or baby botnet, is a small network of Internet-connected computers that have been hijacked to attack specific companies or individuals within a company.23 Oct 2009
Security Management Strategies for the CIO