Security
|
Written by Daniel
|
Wednesday, 17 February 2010 18:05 |
From Dark Reading
Defending against malicious software means understanding where it comes from, researcher says
Nearly every day, industry analysts and security researchers warn IT professionals about the skyrocketing proliferation of malware. A simple Web search turns up many reports that dissect the technical nature of malicious software, how it works, and how it affects its victims.
|
Read more...
|
|
Security
|
Written by Daniel
|
Tuesday, 16 February 2010 19:29 |
From Computer World
Contest targets to include iPhone, Droid and BlackBerry, IE, Firefox and Chrome
A hacking contest next month will award cash prizes of $15,000 to anyone who can break into an iPhone, BlackBerry Bold, Droid or Nokia smartphone.
|
Read more...
|
Security
|
Written by Daniel
|
Tuesday, 16 February 2010 19:19 |
From Daily Tech
Groups urge Muslims to ask for pat down instead
Airport security is and will continue to be an important topic in the post 9/11 world. There is a fine line between security and the invasion of a traveler's privacy. Many are claiming that the new full body scanners at some airports that show images of the human body in detail are an invasion of privacy.
|
Read more...
|
Security
|
Written by Daniel
|
Friday, 12 February 2010 18:12 |
From DarkReading
Oxford University's technology provides secure channel for making peer-to-peer and person-to-person payments
Researchers from the University of Oxford have created a protocol for making electronic payments via mobile phones: The technology provides a secure channel that its inventors hope will be rolled into smartphone mobile banking or other payment applications.
|
Read more...
|
Security
|
Written by Daniel
|
Friday, 12 February 2010 18:07 |
From InformationWeek
The patch is designed to sniff out activation hacks that allow users to bypass software authentication process.
Microsoft will introduce an update to Windows 7 in the coming days that will allow it to ensure users are running genuine copies of the operating system and have not used any activation exploits, or hacks, to defeat the company's validation process.
|
Read more...
|
Security
|
Written by Daniel
|
Wednesday, 10 February 2010 18:39 |
From Daily Tech
Hacker website was closed in November 2009
Hacking into a government or business computer system can yield information for hackers that can be sold for significant profit. Hacking attacks around the world have been increasing steadily and many of the attacks are believed to originate inside of China.
|
Read more...
|
Security
|
Written by Daniel
|
Tuesday, 09 February 2010 18:45 |
From DarkReading
In tests, algorithm was an efficient estimator of worm virulence and could determine the size of the susceptible host population after only a few infections
Self-propagating worms are malicious computer programs, which, after being released, can spread throughout networks without human control, stealing or erasing hard drive data, interfering with pre-installed programs and slowing, even crashing, home and work computers. Now a new code, or algorithm, created by Penn State researchers targets the "stealthiest" of these worms, containing them before an outbreak can occur.
|
Read more...
|
Security
|
Written by Danrok
|
Monday, 08 February 2010 16:17 |
From El Reg:
Now you see it, maintenant... non
Top flight outsourcing firm Tata Consulting Services appeared to have lost control of its website to hackers today, with the domain apparently being touted for sale.
|
Read more...
|
Security
|
Written by Daniel
|
Thursday, 04 February 2010 19:18 |
From PC World
Microsoft warned on Wednesday that a flaw in its Internet Explorer browser gives attackers access to files stored on a PC under certain conditions.
|
Read more...
|
Security
|
Written by Daniel
|
Thursday, 04 February 2010 19:09 |
From DarkReading
The Cybersecurity Enhancement Act of 2009 would fund R&D for a comprehensive cybersecurity plan that would involve the cooperation of several federal agencies
The U.S. House of Representatives is considering its first major cybersecurity bill, following a warning earlier this week from a top intelligence official that U.S. critical infrastructure is vulnerable to serious threats.
|
Read more...
|
|
|
<< Start < Prev 11 12 13 14 15 16 17 18 19 20 Next > End >>
|
Page 13 of 28 |