Items Tagged with "Headlines"


69dafe8b58066478aea48f3d0f384820

Phishing Scammers Getting a Jump on Tax Season

November 22, 2010 Added by:Headlines

Recent alerts concern emails purported to be sent from the Electronic Funds Transfer Payment System which inform the recipient that there is a problem with their tax payments. The email contains a link to a spoofed website that contains malicious malware that will infect the visitor's computer...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Father of the Web Slams Social Media and Apple

November 22, 2010 Added by:Headlines

Why should you care? Because the Web is yours. The Web may be ours, but unfortunately it is is ours much in the same way that Democracy is. And like Democracy, we may already be powerless to protect it from the powerful, well-monied, and thoroughly entrenched interests...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Are Security Efforts Decreasing Successful DoD Hacks?

November 22, 2010 Added by:Headlines

Other reports indicate that the frequency of attacks as a whole are on the uptick. Given the weight of the evidence concerning current trends, the most likely explanation is that the decrease is due to a semantic change in the reporting standards used at the DoD as opposed to a decrease in the attacks...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS and DoD Say Threat of Cyber Attack is Imminent

November 22, 2010 Added by:Headlines

Secretary of Defense Robert M. Gates recently described the threat of cyber attack as huge when addressing The Wall Street Journal's CEO council. Gates also revealed plans for the the DHS to engage the NSA in more domestic cyber security operations. Here is a transcript of Gates' statements...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Kroxxu Botnet Infects One Hundred Thousand Domains

November 21, 2010 Added by:Headlines

The malware is geared to steal File transfer Protocol (FTP) password information, allowing its creators to access, alter and control websites. The malicious code also can render URL blocking tools ineffective, letting infected users browse websites that would otherwise not be white-listed...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

People Remain the Number One Threat to Security

November 21, 2010 Added by:Headlines

All the security, training, planning and education in the world can not seem to defend against the human element, and this fact presents the single largest obstacle to security for individuals, enterprise, and government. Here are just a few examples from this week alone...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US Government is Headhunting Cyber Warriors

November 20, 2010 Added by:Headlines

Even if there were a systemic change in the way of we prepare kids for technology careers, the US would still be a generation behind nations in Asia and Europe. The result could be the loss of our competitive edge in the marketplace, and result in the loss of our status a cyber superpower...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Google and Yahoo Allow Gov Surveillance For a Price

November 19, 2010 Added by:Headlines

Privacy advocate Christopher Soghoian did some snooping of his own through the Freedom of Information Act and found that Google charged the DEA $25 per case for access to user data. Yahoo, in an ongoing to effort to best Google at something, charged the agency $29 per case...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researchers Find Weakness in ZeroAccess Rootkit

November 19, 2010 Added by:Headlines

Though the maleware is not as prevalent as other threats, it has caught the attention of security pros because it is sophisticated, difficult to detect, and nearly impossible to remove without damaging the infected operating system. ZeroAccess acts as a conduit to download and execute other malware...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Legislation to Give DHS Power Over Private Networks

November 19, 2010 Added by:Headlines

Proposed legislation in the House of Representatives would give the Department of Homeland Security new authority to enforce cyber security standards aimed at shoring up private sector computer networks considered critical to national security...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Denial of Service Attacks Remain Popular Tactic

November 18, 2010 Added by:Headlines

Denial of Service (DoS) has often been used to as a tool send a message to the subjects of the attacks, and recent events indicate the use of the tactic to strategically promote the agendas of one group over those of another is on the upswing...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Chinese Pursue State Sponsored Cyber Espionage

November 18, 2010 Added by:Headlines

Reports have asserted that the Chinese government is actively using Chinese telecom companies to conduct cyber espionage against the United States, and questions have been raised about partnerships with Chinese telecom companies and corporations tied to Governor-elect Rick Snyder of Michigan...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Mac Users Get Massive Security Wake Up Call

November 18, 2010 Added by:Headlines

Mac users, who have have long been used to lambasting Windows users over security issues, are getting a big dose of exploit reality this week as Apple releases fixes for 134 vulnerabilities. The record-breaking patch release for Mac OS dwarfs Microsoft's record of 49 patches...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Russian Banks May Be Linked to Zeus Hackers

November 18, 2010 Added by:Headlines

The Chief of the Russian Financial Monitoring Service, Yury Chikhankin, announced a pending investigation into whether Russian financial institutions participated in laundering funds stolen by those responsible for the infamous Zeus Trojan virus...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Windows Remains Vulnerable to TDL4 Rootkit

November 17, 2010 Added by:Headlines

How does the old adage go? Something like 'good security efforts always keep us one step behind the bad guys'? The TDSS rootkit exploit known as TDL4, and sometimes referred to as a bootkit, manifests as an infection in the master boot record of a PC by using kernal-level code...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Billions of Dollars in Security Efforts Rendered Moot

November 17, 2010 Added by:Headlines

A report released by mobile technology vendor iPass reveals that nearly one quarter of employees surveyed admit that they regularly disregard security measures meant to protect sensitive data by accessing corporate networks on non-approved mobile communications devices...

Comments  (1)

Page « < 67 - 68 - 69 - 70 - 71 > »