Archive | Uncategorized RSS feed for this section

Privacy ‘bill of rights’ exempts government agencies | Privacy Inc. – CNET News

Over on the post “Privacy ‘bill of rights’ exempts government agencies | Privacy Inc. – CNET News” contains this text: “Privacy ‘bill of rights’ exempts government agencies by Declan McCullagh news analysis Two U.S. senators introduced sweeping privacy legislation today that they promise will ‘establish a framework to protect the personal information of all Americans.’ […]

Leave a comment Continue Reading →

Exploit-wielding boffins go on free online shopping binge • The Register

Over on the post “Exploit-wielding boffins go on free online shopping binge • The Register” contains this text: “Exploit-wielding boffins go on free online shopping binge Alert Print Post comment Retweet Facebook World’s biggest e-commerce sites wide open By Dan Goodin in San Francisco • Get more from this author Posted in Security, 12th April […]

Leave a comment Continue Reading →

Be Prepared for Targeted Phishing Attacks in Wake of Epsilon Breach

Be Prepared for Targeted Phishing Attacks in Wake of Epsilon Breach: ” recent Epsilon data breach involving millions of customer’s names and e-mail addresses is a gold mine for cybercriminals planning targeted phishing attacks. Why is this so? The main reason: now that the bad guys have names and emails for customers from big names […]

Leave a comment Continue Reading →

Hacker ‘handshake’ hole found in common firewalls

Over on the post “Hacker ‘handshake’ hole found in common firewalls” contains this text: “Hacker ‘handshake’ hole found in common firewalls NSS Labs tested Cisco, Check Point, Fortinet, Juniper, the Palo Alto Networks, and SonicWall firewalls By Ellen Messmer, Network World April 12, 2011 03:33 PM ET Comment Print Some of the most commonly-used firewalls […]

Leave a comment Continue Reading →

Microsoft delivers monster security update for Windows, IE – Computerworld

Over on the post “Microsoft delivers monster security update for Windows, IE – Computerworld” contains this text: “Computerworld – Microsoft today patched a record 64 vulnerabilities in Windows, Office, Internet Explorer (IE), and other software, including 30 bugs in the Windows kernel device driver and one in IE that was exploited at the Pwn2Own hacking […]

Leave a comment Continue Reading →

Security researcher warns over Dropbox authentication security flaw • The Register

Over on the post “Security researcher warns over Dropbox authentication security flaw • The Register” contains this text: “Security researcher warns over Dropbox authentication security flaw Alert Print Post comment Retweet Facebook Knitted in insecurity By John Leyden • Get more from this author Posted in Cloud, 12th April 2011 10:20 GMT On Demand Webcast : […]

Leave a comment Continue Reading →

Hackers disclose SQL injection of Barracuda website > Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security > Network Access > Access Control > News > SC Magazine Australia/NZ

Over on the post “Hackers disclose SQL injection of Barracuda website > Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security > Network Access > Access Control > News > SC Magazine Australia/NZ” contains this text: “Chalk up Barracuda Networks as the latest information security firm to fall victim to a cyberattack. Hackers, apparently […]

Leave a comment Continue Reading →

Layer 2 DoS and other IPv6 Tricks

Over on the post “Layer 2 DoS and other IPv6 Tricks” contains this text: “IPv6, just like IPv4, is a layer 3 (Network Layer) protocol. However, it does depend on Layer 2 (Link Layer) to reach the next hop. Historically, Layer 2 has been a fertile attack breeding ground. Layer 2 protocols like Ethernet do […]

Leave a comment Continue Reading →

Policy-based security and access control

Over on the post “Policy-based security and access control” contains this text: “Policy-based security and access control SUNY Old Westbury’s CIO talks about the school’s policy-based approach to securing the network and controlling bandwidth use By Joan Goodchild, CSO April 05, 2011 06:07 PM ET Comment Print In a university environment, there is no time […]

Leave a comment Continue Reading →

State of Texas exposes data on 3.5 million people | Naked Security

Over on the post “State of Texas exposes data on 3.5 million people | Naked Security” contains this text: “State of Texas exposes data on 3.5 million people by Chester Wisniewski on April 12, 2011 | Comments (7) FILED UNDER: Privacy, Data loss, Featured Susan Combs, Comptroller for the state of Texas announced a massive […]

Leave a comment Continue Reading →