February 2009
-
February 26, 2009
26
Feb'09
Data walks out the door, but what do you really care about?
There were only two of us on the graveyard shift. “If it’s not locked up,” a colleague at my first newspaper declared as he snatched a folder of papers from our boss’ desk and strode towards the ... Continue Reading
-
February 26, 2009
26
Feb'09
Conficker botnet ready to be split, sold
Conficker's peer-to-peer update method allows the owner to sell pieces of the botnet to the highest bidder, experts say. Continue Reading
-
February 26, 2009
26
Feb'09
VM servers affected by Intel TXT exploit method
Though the flaws identified in TXT take great expertise to exploit, IT pros should ensure critical system software and VM servers are under lock and key control. Continue Reading
-
February 25, 2009
25
Feb'09
What Obama's Blackberry means for mobile device security
Barack Obama started an uproar in the security community by being the first president to carry a Blackberry. How secure are these mobile devices? Should any enterprise CEO or vice president have one? Continue Reading
-
February 25, 2009
25
Feb'09
Adobe updates Flash Player to fix clickjacking, buffer overflow flaws
Flaws in Adobe Flash Player could be used by an attacker to gain access to system files and take control of a computer. Adobe recommends updating to the latest version. Continue Reading
-
February 25, 2009
25
Feb'09
A simple substitution cipher vs. one-time pad software
Both a simple subsitution cipher and one-time pad software have data encryption benefits despite their differences. Continue Reading
-
February 24, 2009
24
Feb'09
Attackers target Microsoft Excel zero-day flaw
Security researchers are investigating reports of a zero-day flaw in Microsoft Excel being actively targeted by attackers. Continue Reading
-
February 24, 2009
24
Feb'09
Microsoft Conficker worm offers attack prevention lesson
Though a payload hasn't been issued, the Conficker worm reminds security professionals to be actively protecting the network from attacks. Continue Reading
-
February 24, 2009
24
Feb'09
Laid off workers likely to steal company data, survey warns
In an era of layoffs and company cutbacks, disgruntled employees often leads to data leaks, according to a survey from Symantec and the Ponemon Institute. Continue Reading
-
February 24, 2009
24
Feb'09
Sourcefire issues Adobe zero-day patch to block attacks
"Home brew patch," blocks attempts by hackers to exploit an unpatched buffer overflow vulnerability in Adobe Reader 9. Continue Reading
-
February 23, 2009
23
Feb'09
Learn about enterprise strategy for server virtualization single sign-on
Virtualization is a technology that's taking off, but how can information security professionals know how it will interact with their existing networks and applications? In this identity and access management expert response, learn how virtualizing ... Continue Reading
-
February 23, 2009
23
Feb'09
Hacker sentenced for stealing millions from U.S. credit cards
A Bulgarian man was given a jail sentence for money laundering, financial fraud and extortion as the result of his ties to a cybercriminal gang that stole credit card data. Continue Reading
-
February 23, 2009
23
Feb'09
Group identifies top 20 security controls to thwart cyberattacks
Experts said the latest list could help government agencies address FISMA compliance by prioritizing cybersecurity initiatives to block the latest attack vectors. Continue Reading
-
February 23, 2009
23
Feb'09
Recovering lost passwords with Cain & Abel
In his latest screencast, Peter Giannoulis of The AcademyPro.com demonstrates how to use the Cain & Abel tool to decipher or track down lost passwords.. Continue Reading
-
February 23, 2009
23
Feb'09
Spyware Protection and Removal Tutorial
This free spyware protection and removal tutorial is a compilation of free resources that explain what spyware is, how it attacks and most importantly what you can to do to win the war on spyware. Continue Reading
-
February 22, 2009
22
Feb'09
When should a virtual patch be used?
Learn how virtual patches can help administrators review, test and schedule official patch updates and find out about the benefits a virtual patch provides, such as protection against identified vulnerabilities. Continue Reading
-
February 22, 2009
22
Feb'09
Black Hat DC 2009: Keynote excerpt – Paul Kurtz, former White House advisor
Former White House advisor Paul Kurtz, said representatives from the public and private sector need to coordinate who should direct a national response to a cyberattack. Continue Reading
-
February 20, 2009
20
Feb'09
Black Hat DC 2009: Joanna Rutkowska on Intel TXT flaws
In this session excerpt, researcher Joanna Rutkowska explains flaws discovered in current Intel Trusted Execution Technology (TXT) implementations and how they can be exploited. Continue Reading
-
February 20, 2009
20
Feb'09
Attackers target new Adobe zero-day flaw
Attackers are actively targeting a zero-day flaw in Adobe Acrobat Reader software, according to a warning from Symantec. Continue Reading
-
February 19, 2009
19
Feb'09
Is it more secure to have a mainframe or a collection of servers?
The general public may think that mainframe computing is a thing of the past, but expert Michael Cobb reviews why the mainframe is still the cornerstone most large IT projects. Continue Reading