Targeted Threats, Cloud Security Will Top RSA Talk
It's that time of year again, when thousands of security professionals converge here at the Moscone Center in San Francisco to hear about the latest security technologies and trendiest threats. What will top this year's lists?
DHS E-Verify Program Flawed
The Department of Homeland Security's online verification system wrongly identifies unauthorized workers more than half the time, study says.
Intel Hacked At Same Time As Google
Intel's annual report revealed that the company was successfully hacked this past January, around the same time as the Chinese Google hacks were grabbing all the headlines.
Roundup: Spy Agencies On The Web
U.S. intelligence agencies are using the Web to share information and engage the public. Some offer mobile versions and social networking tools -- others badly need an update.
Can Rip And Replacing Storage Solutions Be Good?
When you hear the term "Rip and Replace" it is not typically considered a good feature. In fact most of the time you hear it will be from a vendor stating that their solution is NOT rip and replace. Which of course they expect you to take to be good. Are there times though were rip and replace could be a good thing?
Is That A Rootkit In Your Pocket?
Computer scientists from Rutgers University have demonstrated how smart phones could be as susceptible to rootkit infiltration as PC and server operating systems.
Fight Malware With Software Restriction Policies
Good news for Department of Defense folks. They can now start using USB flash drives again -- provided there's absolutely no other way to transfer the data from point A to point B. OK, so maybe it isn't time to rejoice just yet.
FBI Investigating Web Spycam
As a federal investigation begins, a security researcher has uncovered evidence related to the case and provided a way to identify the surveillance software
FBI Investigating Web Spycam
As a federal investigation begins, a security researcher has uncovered evidence related to the case and provided a way to identify the surveillance software.
Firewalls And DIY Plug-Ins
Let's face it: Users love the concept of adding free plug-ins and apps to customize and empower the base software tool, whether it's in a smartphone or browser. Doing so is fun, it's cool, and it lets them personalize their software to augment or shape how they use it. Even firewall management has joined the plug-in party.
Navy Soliciting Cybersecurity Bids
The Office of Naval Research plans to spend $16 million through 2015 to protect its data and secure operations in the event of a cyberattack.
P2P Business Problems Growing: FTC Issues Warnings
The FTC's announcement that nearly 100 private and public organizations had insecurely transmitted confidential, personal data over P2P networks is a wakeup call not just to those receiving the warnings, but to every business whose employees may be using file-sharing technology -- and especially to those who don't know whether employees are P2Ping or not.
Storage Services In The Infrastructure
In our last entry we discussed using storage services as part of the hypervisor in a virtual server environment. In this entry we will explore embedding those services as part of a SAN infrastructure itself. In this deployment the storage services that we have come to count on are essentially part of the SAN switch instead of on the storage controller.
FTC Warns Of Widespread Data Breaches
Almost 100 organizations have been notified by the agency that sensitive personal data about their employees and customers has been shared from their networks over peer-to-peer file sharing services.
DHS May Scrap Border Patrol Project
The Department of Homeland Security is reevaluating a plan to add security cameras, radar, and sensors, to patrol efforts along the U.S. Mexico border.
Enhancing Botnet Detection With Manpower
The average computer user (a.k.a. most of my family) doesn't have a fighting chance. I hate to say it, but the malware we're seeing on a daily basis makes this scary fact evermore true. There is absolutely no way that most home users are going to be able to protect themselves against modern malware like Zeus. Malware authors have become extremely good and proficient at what they do because it's making them money.
Adobe, Mozilla Users At Risk To Remote Code Execution Flaws
Software maker Adobe Systems has certainly had its share of vulnerabilities recently. This week a security researcher added to the company's pain when he announced a vulnerability in Adobe Download Manager that allows remote attacks. Mozilla Firefox users are also at-risk to attacks against an unpatched flaw in that browser.
Boosting Your Defenses Against Botnet Infections
In the past few weeks since the Google/China incident, we have seen a number of interesting blog posts and white papers that provide further details on some of the techniques used by the attackers.
Storage Service At The Hypervisor
In our last entry we discussed what storage services are and reviewed the traditional manner in which they are delivered. They are the capabilities that make a storage system more than just an array and this intelligence typically lives on the storage controllers. There are several alternative ways to deliver these services and one of the newest is to leverage server virtualization. Storage service at t