Disney Introduces Social Media Site
Let The Memories Begin offers guests a site to share photo, video or text memories and allows Disney to use the content in advertising and marketing.
What Solid State Form Factor Is Best - Integration
Returning to our Solid State Form factor series; this entry we are going to begin the discussion about solid state integration. There are really two parts of the integration discussion; how will you integrate solid state disk into your storage infrastructure and the other is how will your vendor integrate solid state disk into their storage system? We'll tackle the vendor issue first since it may directl
'Here You Have' A Lesson
It's been interchangeably called spam, or a targeted attack that spun out of control, or a form of cyber-jihad with alleged geopolitical implications. But regardless of what you call it, the "Here You Have" email worm is an excellent example of just how well today's security can work. Here are a few justifications for that optimism.
AMD Lowers Q3 Sales Forecast
Intel and AMD both cut forecasts for the third quarter citing weaker than expected sales of processors for consumers PCs.
Different Flavors Of The Insider Threat
There are different categories of insider threats, based on the level of access the employee has. There are four types: pure insider, insider associate, insider affiliate, and outside affiliate. Each of these categories also has different motives. Understanding each is a key to building proper preventive and detective defenses.
Samsung Epic 4G First To Access Media Hub
Sprint has launched a series of "epic mini movies" that showcase the Android handset's entertainment capabilities and the download speeds of the carrier's 4G network.
The Cookies You Can't Remove
They say that some things last forever, like diamonds or true love or Twinkies. But should browser cookies used for tracking be added to that list?
Web-Based Spam Detection With Google Alerts
Search engines are great, powerful tools. They can help find an answer when you've tried everything you can think of. They can also help find information about a company you may be performing a penetration test on.
Twitter Worm Fixed
A cross-site scripting flaw that allowed several worms to spread on Twitter has been repaired.
Twitter Under Attack
There's a cross-site site scripting flaw aggressively spreading across the social networking site Twitter. I know, I was hacked first thing this morning. . .
Virtual Desktops And Storage - Dealing With Boot Storms
Virtual desktop environments are different than virtual server environments when discussing performance. To the virtual desktop environment we need to be able to provide acceptable performance consistent, but moderate, performance throughout the day to a set of endpoints (desktops and laptops) that have similar I/O patterns. This is different than server virtualization which has highly random I/O patterns and needs very high performance at peak moments throughout the day.
The What And The Why Of Professional Penetration Testing
Welcome to the first in a series of posts on professional penetration testing. During the course of the next few entries, I will shed light on the often confusing and rarely straightforward world of penetration testing based on my experience during the past decade as both a professional penetration tester and a manager of penetration testing teams.
NIST Research Could Boost Mobile Device Security
An electron spinning technique could pave the way for a new generation of wireless device signals that are difficult for enemies to intercept, according to researchers at the National Institutes of Standards and Technology.
Missing The Insider Threat
"I trust everyone. It is the devil inside that I do not trust" is a great line from the movie "The Italian Job." Every single person has the potential to do harm if the right circumstances occur. Yes, this includes employees.
Protegrity Gets Aggressive
Last week Protegrity announced it had filed patent infringement suits against NuBridges and Voltage Security Inc., its main competitors. Patent infringements suits are nothing new with technology companies, but this one was a little odd in that the suits were actually filed in May.
A Lesson From Steve Jobs' Email
We've all had one of these moments: You get an email and quickly respond without putting much thought into it. Then you end up wishing you'd taken more time.
Security Exploits Increasingly Complex
A study from HP TippingPoint finds that web applications are still an attack magnet, but hackers now appear to be collaborating more closely to spot new flaws.
|