dcsimg

Threats - Article Archives - Page 210

Microsoft Looks to 'Mitigate' Security Flaws With Updated Tool

September 03, 2010 |
Microsoft says it is shipping the newest version of an administrator's tool that helps manage key mitigation parameters in order to help corporate customers stay safer.
READ MORE

Twitter Retools App, Link Policies, Sparks Privacy Worries

September 02, 2010 |
Microblogging service alerts users to two changes to how third-party applications integrate with the site, raising privacy concerns in the process.
READ MORE

Microsoft Releases 'Fix It' for DLL Hole

September 02, 2010 |
The company moves to help thwart attacks that can seize control of users' systems by taking advantage of shoddy programming practices.
READ MORE

Why SCADA Security Matters--And What You Should Know About It

September 02, 2010 |

Worst case scenarios of distributed SCADA attacks include bringing down the power grid to a major metropolitan city, yet most SCADA experts are not security experts--and vice versa.

READ MORE

The Best Security for Wireless Email

September 01, 2010 |
Sending email over a wireless network, either Wi-Fi or your mobile carrier's data network, is a risky proposition. Learn how to protect your corporate and personal communication.
READ MORE

IT Security Workers Are Most Gullible of All: Study

August 31, 2010 |
Study shows that even security professionals aren't terribly good at deflecting social engineering attacks --a problem that their organizations' IT departments must solve.
READ MORE

Review: EncryptStick Digital Privacy Manager

August 31, 2010 |

EncryptStick Digital Privacy Manager from ENC Security Systems--free for a limited-capacity version, $39.99 unlimited--offers unparalleled security for USB devices.

READ MORE

CA Snares Arcot for Identity Management

August 30, 2010 |
The software developer bolsters its security portfolio with the acquisition of Arcot, a provider of cloud-based advanced authentication and fraud prevention applications.
READ MORE

Deloitte: Financial Services Firms Prioritize IAM

August 30, 2010 |
While financial services firms across the world continue to make budget cuts, Deloitte says the knife has passed over many information security budgets, and those firms are turning their attention to Identity and Access Management (IAM).
READ MORE

New 64-Bit Windows Rootkit Already 'In The Wild'

August 27, 2010 |
An updated rootkit already floating around the Internet may be a new milestone in how to break into Windows.
READ MORE

Top 5 Riskiest Places to Go Online

August 27, 2010 |
Traveling for business? Thinking of outsourcing to Russia? AVG compiled data for 144 countries and ranked the safest--and the most dangerous--destinations from which to go online.
READ MORE

Malware Scam Uses Celebrity Deaths as Lure

August 27, 2010 |
New malware campaign sends unsolicited emails with subjects indicating that a celebrity has died in car crash. If you open the accompanying file, the only wreck will be on your PC or mobile device.
READ MORE

Security Breach Exposes UConn Applicants Personal Information

August 26, 2010 |
More than 10,000 applicants at the University of Connecticut are being notified by school officials that their personal data was exposed earlier this month when a university laptop was stolen.
READ MORE

Devastating Military Security Breach Exposed Combat Data

August 26, 2010 |
U.S. official confirms a 2008 cyber attack that infected computers used to monitor U.S. combat troops and activities in Iraq and Afghanistan.
READ MORE

Security Product Watch, August 24, 2010

August 24, 2010 |
Security vendors fare well as Inc. magazine releases its Inc 500/5000 list, which identifies companies across many industries with significant growth.
READ MORE

Microsoft Was Warned of DLL Vulnerability a Year Ago

August 24, 2010 |
A security hole in the internals of many Windows applications could lead to an unprecedented rewrite of many popular programs.
READ MORE

More Windows Apps at Risk Following iTunes Patch?

August 20, 2010 |
A European security firm started out to warn Apple that iTunes for Windows had a critical fault, but now another security sleuth says it affects dozens of other programs, as well.
READ MORE

DIY Facebook Malware Kit Digs for Login Credentials

August 18, 2010 |
A new do-it-yourself malware kit called Facebook Hacker is extremely easy to use and, according to security experts, particularly adept at snaring passwords for Facebook, as well as other sites.
READ MORE

Half of Enterprise Employees Would Steal IP: Survey

August 17, 2010 |
A new study finds disquieting attitudes toward corporate data theft, with higher-paid employees the most likely to swipe intellectual property on their way out the door.
READ MORE

How To Defeat The U.S. In Cyberspace

August 16, 2010 |
An ethical hacker builds a master plan to crush America--or teach it how to defend itself.
READ MORE