-
VM servers affected by Intel TXT exploit method
Though the flaws identified in TXT take great expertise to exploit, IT pros should ensure critical system software and VM servers are under lock and key control.26 Feb 2009
-
Conficker botnet ready to be split, sold
Conficker's peer-to-peer update method allows the owner to sell pieces of the botnet to the highest bidder, experts say.26 Feb 2009
-
What Obama's Blackberry means for mobile device security
Barack Obama started an uproar in the security community by being the first president to carry a Blackberry. How secure are these mobile devices? Should any enterprise CEO or vice president have one?25 Feb 2009
-
Adobe updates Flash Player to fix clickjacking, buffer overflow flaws
Flaws in Adobe Flash Player could be used by an attacker to gain access to system files and take control of a computer. Adobe recommends updating to the latest version.25 Feb 2009
-
A simple substitution cipher vs. one-time pad software
Both a simple subsitution cipher and one-time pad software have data encryption benefits despite their differences.25 Feb 2009
-
Microsoft Conficker worm offers attack prevention lesson
Though a payload hasn't been issued, the Conficker worm reminds security professionals to be actively protecting the network from attacks.24 Feb 2009
-
Attackers target Microsoft Excel zero-day flaw
Security researchers are investigating reports of a zero-day flaw in Microsoft Excel being actively targeted by attackers.24 Feb 2009
-
Sourcefire issues Adobe zero-day patch to block attacks
"Home brew patch," blocks attempts by hackers to exploit an unpatched buffer overflow vulnerability in Adobe Reader 9.24 Feb 2009
-
Laid off workers likely to steal company data, survey warns
In an era of layoffs and company cutbacks, disgruntled employees often leads to data leaks, according to a survey from Symantec and the Ponemon Institute.24 Feb 2009
-
Recovering lost passwords with Cain & Abel
In his latest screencast, Peter Giannoulis of The AcademyPro.com demonstrates how to use the Cain & Abel tool to decipher or track down lost passwords..23 Feb 2009
-
Group identifies top 20 security controls to thwart cyberattacks
Experts said the latest list could help government agencies address FISMA compliance by prioritizing cybersecurity initiatives to block the latest attack vectors.23 Feb 2009
-
Learn about enterprise strategy for server virtualization single sign-on
Virtualization is a technology that's taking off, but how can information security professionals know how it will interact with their existing networks and applications? In this identity and access...23 Feb 2009
-
Hacker sentenced for stealing millions from U.S. credit cards
A Bulgarian man was given a jail sentence for money laundering, financial fraud and extortion as the result of his ties to a cybercriminal gang that stole credit card data.23 Feb 2009
-
Spyware Protection and Removal Tutorial
This free spyware protection and removal tutorial is a compilation of free resources that explain what spyware is, how it attacks and most importantly what you can to do to win the war on spyware.23 Feb 2009
-
When should a virtual patch be used?
Learn how virtual patches can help administrators review, test and schedule official patch updates and find out about the benefits a virtual patch provides, such as protection against identified vu...22 Feb 2009
-
Black Hat DC 2009: Keynote excerpt – Paul Kurtz, former White House advisor
Former White House advisor Paul Kurtz, said representatives from the public and private sector need to coordinate who should direct a national response to a cyberattack.22 Feb 2009
-
Attackers target new Adobe zero-day flaw
Attackers are actively targeting a zero-day flaw in Adobe Acrobat Reader software, according to a warning from Symantec.20 Feb 2009
-
Black Hat DC 2009: Joanna Rutkowska on Intel TXT flaws
In this session excerpt, researcher Joanna Rutkowska explains flaws discovered in current Intel Trusted Execution Technology (TXT) implementations and how they can be exploited.20 Feb 2009
-
What is most misunderstood about EV SSL certificates?
Are there any calculators to help estimate log generation based on number of devices and best practices?19 Feb 2009
-
Should the government reduce its external Internet connections?
To reduce its susceptibility to attack, the federal government announced a plan to gradually reduce its number of Internet connections. Mike Chapple explains why the idea is a feasible one that all...19 Feb 2009
Security Management Strategies for the CIO