Items Tagged with "Headlines"


69dafe8b58066478aea48f3d0f384820

FBI Wants More Access to Internet Communications

November 17, 2010 Added by:Headlines

Creating systems to easily and quickly un-encrypt data could produce a threat to sensitive information that would otherwise remain secure. The widely publicized Aurora attacks originating in China used back-doors that were originally created to give the government easy access to communications..

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Internet Kill Switch Debate Still Very Alive

November 17, 2010 Added by:Headlines

Regardless of the outcome of the proposed legislation, in the case of a national emergency, Internet access will be marginal at best, and business continuity plans that rely heavily on the notion that employees will be able to login to corporate networks from home are severely flawed...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Verizon Unveils Threat and Breach Reporting Portal

November 16, 2010 Added by:Headlines

Verizon has launched an anonymous breach reporting website with ICSA Labs called VERIS in an effort to elicit and consolidate data on security threats that are often isolated in disparate information silos or that remain unreported entirely...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

USCC Report to Detail Chinese Cyber Espionage

November 16, 2010 Added by:Headlines

The U.S.-China Economic and Security Review Commission will release a report which is expected to detail the recent hijacking of 15% of worldwide internet traffic through Chinese telecom networks which contained data packets from the United States military, Executive Branch, and NASA...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FBI's IC3 Has Logged Two Million Internet Crime Reports

November 16, 2010 Added by:Headlines

Statistics reported by the organization, which was was established as a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C), indicate the losses from cyber crime have doubled in recent years...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Attacks Against Critical Infrastructure On the Rise

November 16, 2010 Added by:Headlines

More than three-quarters of respondents indicated the frequency of attacks was increasing. Companies reported an average of ten attacks over the past five years, and nearly half of those surveyed expect to be subject to another attack in the next twelve months...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Imperva Releases Top 10 Security Threats for 2011

November 15, 2010 Added by:Headlines

The predictions for the top ten information security trends expected in 2011, compiled by Imperva’s Application Defense Center, are based on analysis of incident and vulnerability data from the past year as well as findings from the company’s Hacker Intelligence Initiative...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

One Quarter of All PC Users Stung by Help Desk Scams

November 15, 2010 Added by:Headlines

Internet scam artists are unrelenting in their efforts to lure unsuspecting web users into handing over sensitive information. A report by consumer security advocates GetSafeOnline.org reveals a stunning twenty-five percent of all PC users have been fooled by Help Desk scams...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Stuxnet Developed to Halt Iran's Uranium Enrichment

November 15, 2010 Added by:Headlines

Researchers from Symantec have concluded that Stuxnet was designed to interfere with the performance of high-speed electric motors, the types which would be required to operate the gas centrifuges used in the refinement process...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Tumblr Hits 4chan With DDoS Attack - War Enusues

November 15, 2010 Added by:Headlines

Users of the popular Tumblr website launched a preemptive DDoS attack that downed competitor 4chan after rumors circulated that 4chan was preparing to flood rival Tumblr with submissions designed to knock its servers offline. And so the DDoS war has begun...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Meet the Most Dangerous Domain - .VN

November 15, 2010 Added by:Headlines

More than half of the domains with the suffix .VN contain malicious code meant to infect surfers and steal sensitive information, according to research released by McAfee. .VN is the riskiest national domain to visit, exceeded only by the ubiquitous .COM and .INFOR...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Irony - Administration Proposes Internet Privacy Czar

November 14, 2010 Added by:Headlines

It is ironic to think that an increase in government monitoring and policing of online activities will do anything to increase privacy for consumers. As a free society, we need to be careful about empowering federal bureaucracies in order to preserve individual freedoms...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Realtek Digital Certificates Accompany Malware

November 14, 2010 Added by:Headlines

The certificates are similar to those that accompanied the Stuxnet virus. There is no evidence that Realtek is authorizing the use of the certificates, and researchers speculate that criminal cyber gangs responsible for the Lethic malware are simply using unverified forgeries...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Koobface Botnet Server Disabled - For Now

November 13, 2010 Added by:Headlines

Koobface, on the scene since 2008, has been one of the most notoriously successful botnet operations ever tracked, though not necessarily the most insidious, as the network has never sought to capitalize on its full potential...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Java Still Presents Soft Target for Malware Threats

November 13, 2010 Added by:Headlines

The exploit is still being proliferated despite the fact that a patch to prevent the infection has been available since July, which is evidence that users have not been as proactive about securing Java as regularly as they update Windows patches...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US Officials Overwhelmed By Cyber Defense Problem

November 13, 2010 Added by:Headlines

Further obstacles to innovation are inherent in the legislative process, with a plethora of competing cyber security bills being offered for consideration. Legislation is a slow and cumbersome process, and results in regulatory red tape that ultimately inhibits the private sector...

Comments  (0)

Page « < 68 - 69 - 70 - 71 - 72 > »