Search Results | Malware
PREV 1...10   20   30...36   37   38   39   40   41   42   43   44   45...   50   60   70...76 NEXT
Sort by:  Most Relevant  |  Date
Washington Post slashes US spam after Internet Community fails

Blog   Within an hour of receiving a dossier from Brian Krebs,a Washington Post staff writer, McColo, which supposedly hosted 75% of the US spam operators was taken off air by Global Crossing. It helped, of course, that the latter had been handed the opportunity to ...

Last updated: Nov 15, 2008   11:57 AM GMT  |  Blog: When IT Meets Politics   |      Eurim, McColo
What can software application developers expect from InfoSec?

Blog  The InfoSecurity Show 2012 is on next week at London's glittering Earl's Court. The collective PR machine driving vendors' appearances at the show has been just a little wearisome, with very few clients taking the trouble (so far) to drill down into the real "what it means to you" element for pract...

Last updated: Apr 20, 2012   4:14 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
Two examples of real information warfare hacking

Blog   It's important to remember what we mean when we talk about hacking these days. Hacking has many positive connotations and is often used hand-in-hand with the term 'mashup'. Coders using APIs relating to popular web services to provide new incremental layers of user functionality is, of course, hack...

Last updated: Nov 4, 2011   11:51 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
Rule of 'Thumb': You're Going to Lose Them

Blog  To anybody who's run a USB memory stick through the laundry or left one sitting in a remote machine, there's no surprise in the results from therecent Ponemon Institute study, The State of USB Drive Security. Ponemon, which performed the study on behalf of Kingston, a manufacturer of encrypted USB...

Last updated: Aug 14, 2011   0:47 AM GMT  |  Blog: Yottabytes: Storage and Disaster Recovery
Credit union warns of phony banking Android app

Blog  Mobile banking app tries to gain access to financial data. App removed from Android marketplace. In what could be one of the first signs that attackers are testing smartphones as another way to gain access to sensitive information, a Beaverton, Oregon credit union is warning its customers about a r...

Last updated: Jan 11, 2010   2:09 PM GMT  |  Blog: Security Bytes
Are we more secure seven years later?

Blog  One of the after effects of the terrorist attacks of Sept. 11, 2001, was a hyper-awareness of security of both our physical and digital environments. This has translated into the creation of new government agencies (DHS, TSA), rafts of legislation and billions of dollars of venture capital investmen...

Last updated: Sep 11, 2008   7:38 PM GMT  |  Blog: Security Bytes
Cyber Security Checklist For Every Business and Enterprises

Blog  Cyber threats are increasing in a larger fashion. That calls for a higher scale of cyber security irrespective of the size of the business. Of course, data security is of prime importance for any business. Creating a security positive culture in your organization while you are scaling up in terms of...

Last updated: Aug 29, 2017   5:35 PM GMT  |  Blog: Quality Assurance and Project Management   |      Cyber security
We must be careful about what we do on the internet: Part 1

Blog  As a network admin at Antonelli College, one of my duties is making sure that the students are fully briefed on safe browsing practice. It's always nice when one of their peers gives us a hand. Hunter Mitchell, a student worker at the Hattiesburg, Mississippi campus came up with a very good summary ...

Last updated: Aug 20, 2012   2:54 AM GMT  |  Blog: Security Corner
ThreatQuotient ups the ante for dealing with security incidents

Blog  ThreatQuotient ups the ante for dealing with security incidents The hardware and software that constitutes the average organisations IT infrastructure records millions of events a day which are recorded in log files. This is known as machine data. Nearly all such events are benign and of little ...

Last updated: Apr 10, 2018   2:51 PM GMT  |  Blog: Quocirca Insights
The trouble heading for your business in 2013

Blog   Facebook, Twitter, Apple and Microsoft: all icons of the information technology industry and all the focus for targeted attacks in Feb 2013. The bad news for us all is, that even those that should be some of the most tech-savvy companies in the world, can fall foul of targeted attacks.   Mic...

Last updated: Mar 1, 2013   1:39 PM GMT  |  Blog: Quocirca Insights   |      Apple, Business, Facebook
Risk appraisal and acceptance process

Blog  Today I've been trying to participate in a meeting where everyone except me is sitting in a building in Orlando. Unfortunately, for various reasons I wasn't able to travel over this week so it's a case of straining to join in the discussion in the right place over the telephone and make the right co...

Last updated: Feb 27, 2007   0:01 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      Risk assessment
Apple's Mountain Lion OS X: 100 New Features

Blog  Apple has released the ninth major release of its OS X operating system to developer preview stage. Continuing the big cat family naming tradition, Mountain Lion will introduce Messages, Notes, Reminders and Game Center to the Mac, as well as Notification Center, Share Sheets, Twitter integration an...

Last updated: Feb 17, 2012   4:27 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
Camino web browser, for Mac open source purists only?

Blog  Camino is an open source web browser for Mac OS X users that requires Mac OS X 10.4 or later. If you've never heard of it, then you should at least know that it has been around since 2002 and it has a special 'Safari migration' area on its website to encourage users to make the switch. So what, you...

Last updated: Mar 27, 2011   12:50 AM GMT  |  Blog: Open Source Insider   |      Uncategorized
Peer-to-Peer Networking - Part 2

Blog  Maybe, experientially, the small branch office with a P2P network has escaped a security incident since deployment. Even so, a functional P2P network unintentionally presents itself as a potential target waiting for someone capable of pulling the threat trigger to introduce a potent security disaste...

Last updated: Mar 3, 2009   4:05 AM GMT  |  Blog: IT Governance, Risk, and Compliance
Microsoft Security Intelligence Report v10

Blog  Microsoft recently released Microsoft Security Intelligence Report v10. The report aggregates relevant computer and network security data from more than 600 million PCs across 117 countries--providing a comprehensive look at the threat landscape. A Microsoft On The Issues blog posts describes some ...

Last updated: May 25, 2011   3:47 PM GMT  |  Blog: The Security Detail
Pentagon hackers

Blog   The astonishing thing about the revelation that an infected USB stick caused the US military to suffer its most serious hack is that only now does the Department of Defense admit it is getting serious about hacking. In 2000, Rand consultant Bruce Berkowitz wrote in Foreign Affairs, "US defence expe...

Last updated: Aug 26, 2010   12:15 AM GMT  |  Blog: Read all about IT!   |      Gary McKinnon, Pentagon. hack, USB
How to Run Software in a Virtual Sandbox

Blog  We all know that virtual computing is all the rage lately. I have been using virtual computing in one form or another for over 10 years now. The concept makes since especially with today's powerful servers. There are many reasons that visualization is attracting more customers. For me, one big d...

Last updated: Aug 24, 2010   3:06 AM GMT  |  Blog: Can you hear me now? Tales from a Cisco voice instructor
Fake Microsoft security bulletin circulating

Blog  The folks at the SANS Internet Storm Center are warning of a fake Microsoft security bulletin that's making the rounds. Here's what it looks like: Microsoft Security Bulletin MS06-4 Cumulative Security Update for Internet Explorer (113742734) Published: June 3, 2007 Version: 1.0 Summary Who should...

Last updated: Jun 8, 2007   9:58 AM GMT  |  Blog: Security Bytes
Fighting click fraud with premium clicks

Blog  As the effectiveness of online ads has continued to grow, so has the problem of click fraud. Criminals discovered some time ago that botnets make especially efficient means for perpetrating large-scale click fraud schemes, and they have been refining their techniques for years. Syndicators and onlin...

Last updated: Aug 9, 2007   1:48 PM GMT  |  Blog: Security Bytes
TechTarget's weekly roundup (9/15 - 9/22)

Blog   Cloud Computing image via Shutterstock Was staying independent the right move for Rackspace? Find out in this week's roundup. 1. Rackspace goes all in with managed cloud - Trevor Jones (SearchCloudComputing) Rackspace rebuffed its suitors and opted to stay independent. What that means for the lon...

Last updated: Sep 22, 2014   2:38 PM GMT  |  Blog: Enterprise IT Watch Blog   |      Data breach, Oracle, Rackspace
PREV 1...10   20   30...36   37   38   39   40   41   42   43   44   45...   50   60   70...76 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: