Archive | general security RSS feed for this section

Symantec scraps RSA tokens – Web/client – SC Magazine Australia – Secure Business Intelligence

  Over on the post “Symantec scraps RSA tokens – Web/client – SC Magazine Australia – Secure Business Intelligence” contains this text: “Symantec scraps RSA tokens By Darren Pauli on Jul 8, 2011 2:16 PM Filed under Web/client Managed Security Services? customers “encouraged” to dump RSA. inShare Comment Now and 3 Reactions Symantec has begun […]

Leave a comment Continue Reading →

what happens when airlines merge…or why no ones cares once they get your cash

So the story goes something like this. bout airplane tickest a while ago…..great priceDay before try to get 2 seats together  online at check in…. That did not happen, normal not a big deal.but this time the wife is in a walking boot for her ankle and the kid always flys next to the wife. […]

Leave a comment Continue Reading →

EU ministers seek to ban creation of ‘hacking tools’ – Computerworld

And next it will be books because they teach you how to create…..so therefore they allow you to create hacking tools Over on the post “EU ministers seek to ban creation of ‘hacking tools’ – Computerworld” contains this text: “EU ministers seek to ban creation of ‘hacking tools’ By Jennifer Baker June 15, 2011 07:27 […]

Leave a comment Continue Reading →

Microsoft plugs 34 holes; Adobe fixes Flash Player bug | InSecurity Complex – CNET News

  Over on the post “Microsoft plugs 34 holes; Adobe fixes Flash Player bug | InSecurity Complex – CNET News” contains this text: “Microsoft plugs 34 holes; Adobe fixes Flash Player bug by Elinor Mills Share 18 comments Microsoft released 16 security bulletins today fixing 34 holes, including critical holes in Windows, SMB Client and […]

Leave a comment Continue Reading →

The top 10 passcodes you should never use on your iPhone | Naked Security

  Over on the post “The top 10 passcodes you should never use on your iPhone | Naked Security” contains this text: by Graham Cluley on June 14, 2011 | Comments (5) FILED UNDER: Privacy, Apple, Mobile, Data loss, Featured Are you one of the many people who is using a dangerously easy-to-guess passcode on […]

Leave a comment Continue Reading →

Anonymous targeting Federal Reserve in next attack | InSecurity Complex – CNET News

  Over on the post “Anonymous targeting Federal Reserve in next attack | InSecurity Complex – CNET News” contains this text: “Anonymous targeting Federal Reserve in next attack by Elinor Mills Print E-mail Anonymous warns about attack on Federal Reserve in a YouTube video. (Credit: Anonymous) The Anonymous hacker group says it plans to target […]

Leave a comment Continue Reading →

Schneier on Security: Tennessee Makes Password Sharing Illegal

Over on the post “Schneier on Security: Tennessee Makes Password Sharing Illegal” contains this text: “Tennessee Makes Password Sharing Illegal Here’s a new law that won’t work: State lawmakers in country music’s capital have passed a groundbreaking measure that would make it a crime to use a friend’s login — even with permission — to […]

Leave a comment Continue Reading →

Sony PlayStation Network to reopen in Asia on Saturday – Computerworld

  Over on the post “Sony PlayStation Network to reopen in Asia on Saturday – Computerworld” contains this text Internet News Sony PlayStation Network to reopen in Asia on Saturday By Martyn Williams May 27, 2011 05:28 AM ETComments (0)Recommended (6) IDG News Service – Sony’s PlayStation Network online gaming service will reopen for millions […]

Leave a comment Continue Reading →

Professional online criminals – F-Secure Weblog : News from the Lab

  Over on the post “Professional online criminals – F-Secure Weblog : News from the Lab” contains this text: <<< Friday, May 13, 2011   Professional online criminals Posted by Mikko @ 13:09 GMT | Comments Some of the most common banking trojans we run into are versions of ZeuS (ZBot) and SpyEye. These are […]

1 Comment Continue Reading →

Businesses need to look at security as a military operation – Computerworld

  Over on the post “Businesses need to look at security as a military operation – Computerworld” contains this text: Home > Security News Businesses need to look at security as a military operation By Tim Greene May 12, 2011 06:00 AM ETComments (0)Recommended (3) Network World – LAS VEGAS — Businesses need to look […]

Leave a comment Continue Reading →