Network Security Not Priority for iPad By Michelle Megna - January 29, 2010 The new iPad offers apps and mobility useful to business, but it lacks important security measures, such as support for a VPN. Improve Information Security with PHP Script By W. Jason Gilmore - January 29, 2010 In this tutorial, learn how to securely execute a variety of system-based commands via a PHP script in order to build Web applications that can tightly integrate with both the operating system and third-party software. Facebook, LinkedIn Resist New Privacy Regs By Kenneth Corbin - January 28, 2010 Leading social sites urge regulatory restraint over consumer data collection practices. National Archives Breach Exposes D.C. Insiders' Data By Larry Barrett - January 28, 2010 A hard drive with data including the personal information of more than 250,000 people has gone missing from the National Archives and Records Administration. Cyber Attack Threat Keeps CEOs Up at Night By Larry Barrett - January 28, 2010 Forty percent of IT executives are bracing for a major security incident in their sector within the next year, and only 20 percent think they'll avoid a cyber attack in the next five years. Privacy Bill Nears Introduction in House By Kenneth Corbin - January 28, 2010 Chair of House Internet subcommittee says work on draft discussion of privacy overhaul legislation is almost complete, touts plans for wireless overhaul. 1/29: Backdoor.Tidserv.K Trojan Horse--And Other Malware You Should Know About By eSecurityPlanet Staff - January 29, 2010 A summary of the day's virus and other threats. Get Ready for Windows 7! Pros and Cons? Learn What Our Experts Think Download Free eBook Now. Click Here. | Interested in placing your TEXT AD HERE? Click Here Is the U.S. Gearing Up for Cyber War? By Kenneth Corbin - January 27, 2010 With cyber threats from abroad coming fast and furious, how serious is the United States about going on the offensive? Google Outs Cyber Spies By Gerry Blackwell - January 28, 2010 Googles full disclosure on cyber espionage activity in China may just kick start a much needed international debate. Obama Cyber Czar Digs in For Long Haul By Kenneth Corbin - January 27, 2010 After one month heading up Obama administration's top cybersecurity spot, Howard Schmidt sees plenty of opportunities-and plenty of work. Apache SpamAssassin Takes a New Route in Version 3.30 By Sean Michael Kerner - January 27, 2010 The widely deployed open source antispam engine gets its first major update in two years, with changes aimed at better tackling the problem of spam. U.S. Oil Companies Targets of 'Tenacious' Cyber Attacks By Larry Barrett - January 27, 2010 Senior executives at major oil firms were hit with a series of unsolicited e-mails containing malware designed to steal key proprietary data. Data Breach Costs Surge in 2009: Study By Larry Barrett - January 26, 2010 Ponemon Institute and PGP Corp. study finds average security breach incident costs companies more than $6.7 million in 2009. China Denies Role in Cyber Attacks By Kenneth Corbin - January 25, 2010 Government steps up defense of Internet policy in comments to state news agency as more sites come under attack. Hard Drives Pilfered from BlueCross BlueShield By Larry Barrett - January 25, 2010 Between 220,000 and 500,000 members' Social Security numbers, birth dates, medical information, and addresses were stored on dozens of disks swiped from the insurer's Chattanooga, Tenn. call center. |
No comments:
Post a Comment