testing pos...
Recent News
How to Fix (Or Kill) Web Data About You – NYTimes.com
Over on the post “How to Fix (Or Kill) Web Data About You – NYTimes.com” contains this text: “How to Fix (Or Kill) Web Data About You By RIVA RICHMOND Published: April 13, 2011 As more of our social lives, shopping sprees and dating misadventures take place online, we leave behind, purposely or not, a […]
WordPress.com hack could put premium users at risk | Hacking – InfoWorld
Over on the post “WordPress.com hack could put premium users at risk | Hacking – InfoWorld” contains this text: “WordPress.com hack could put premium users at risk WordPress.com maker Automattic reveals that hackers may have made off with sensitive bits of source code By Ted Samson | InfoWorld Print|Add a comment Malicious hackers have successfully […]
10 of the Worst Moments in Network Security History
Over on the post “10 of the Worst Moments in Network Security History” contains this text: “10 of the Worst Moments in Network Security History Events that shock sensibilities and shaped the future By Ellen Messmer, Network World, 03/11/2008″
Security fragmentation needs to end – Computerworld
Over on the post “Security fragmentation needs to end – Computerworld” contains this text: “Security fragmentation needs to end By Andreas M. Antonopoulos April 13, 2011 05:45 PM ETComments (0)Recommended (0) Network World – A new week, a new rash of attacks against security vendors, email marketers and banks. It would be easy to point […]
U.S. shutters botnet, can disable malware remotely | InSecurity Complex – CNET News
Over on the post “U.S. shutters botnet, can disable malware remotely | InSecurity Complex – CNET News” contains this text: “U.S. shutters botnet, can disable malware remotely by Elinor Mills By seizing servers and domain names and getting permission to remotely turn off malware on compromised PCs, U.S. officials have disabled a botnet that steals […]
CERT/CC Blog: A Security Comparison: Microsoft Office vs. Oracle Openoffice
Over on the post “CERT/CC Blog: A Security Comparison: Microsoft Office vs. Oracle Openoffice” contains this text: “A Security Comparison: Microsoft Office vs. Oracle Openoffice By Will Dormann on April 13, 2011 2:52 PM | Permalink Recently, Dan Kaminsky published a blog entry that compared the fuzzing resiliency of Microsoft Office and Oracle OpenOffice. This […]
Security Research Center – Network World
Over on the post “Security Research Center – Network World” contains this text: “Jack Hembrough, CEO of VaporStream, continues his discussion of controlling e-mail distribution which he started in the last column. Everything that follows is Mr. Hembrough’s own work with minor edits. * * * Have you ever responded to an e-mail, ‘Give me […]
Facebook password changed? Malware attack poses as message from Facebook support | Naked Security
Over on the post “Facebook password changed? Malware attack poses as message from Facebook support | Naked Security” contains this text: “Facebook password changed? Malware attack poses as message from Facebook support by Graham Cluley on April 13, 2011 | Be the first to comment FILED UNDER: Malware, Social networks, Spam Repeat after me: It’s […]
Popular cloud sync app raises security fears | Data security – InfoWorld
Over on the post “Popular cloud sync app raises security fears | Data security – InfoWorld” contains this text: “Popular cloud sync app raises security fears Dropbox makes it easy to sync files among devices, but a crucial weakness points to yet another soft spot in cloud security By Woody Leonhard | InfoWorld”
Legal issues in the Cloud – Part 4 – Truman Hoyle, privacy, legal, due dilligence, data sovereignty, data exit, cloud computing – CIO
Over on the post “Legal issues in the Cloud – Part 4 – Truman Hoyle, privacy, legal, due dilligence, data sovereignty, data exit, cloud computing – CIO” contains this text: “Legal issues in the Cloud – Part 4 There are no laws unique to the Cloud, but you must consider your exit strategy”