Featured News Posts

Recent News

How to Fix (Or Kill) Web Data About You – NYTimes.com

Over on the post “How to Fix (Or Kill) Web Data About You – NYTimes.com” contains this text: “How to Fix (Or Kill) Web Data About You By RIVA RICHMOND Published: April 13, 2011 As more of our social lives, shopping sprees and dating misadventures take place online, we leave behind, purposely or not, a […]

Continue Reading →

WordPress.com hack could put premium users at risk | Hacking – InfoWorld

Over on the post “WordPress.com hack could put premium users at risk | Hacking – InfoWorld” contains this text: “WordPress.com hack could put premium users at risk WordPress.com maker Automattic reveals that hackers may have made off with sensitive bits of source code By Ted Samson | InfoWorld Print|Add a comment Malicious hackers have successfully […]

Continue Reading →

10 of the Worst Moments in Network Security History

Over on the post “10 of the Worst Moments in Network Security History” contains this text: “10 of the Worst Moments in Network Security History Events that shock sensibilities and shaped the future By Ellen Messmer, Network World, 03/11/2008″

Continue Reading →

Security fragmentation needs to end – Computerworld

Over on the post “Security fragmentation needs to end – Computerworld” contains this text: “Security fragmentation needs to end By Andreas M. Antonopoulos April 13, 2011 05:45 PM ETComments (0)Recommended (0) Network World – A new week, a new rash of attacks against security vendors, email marketers and banks. It would be easy to point […]

Continue Reading →

U.S. shutters botnet, can disable malware remotely | InSecurity Complex – CNET News

Over on the post “U.S. shutters botnet, can disable malware remotely | InSecurity Complex – CNET News” contains this text: “U.S. shutters botnet, can disable malware remotely by Elinor Mills By seizing servers and domain names and getting permission to remotely turn off malware on compromised PCs, U.S. officials have disabled a botnet that steals […]

Continue Reading →

CERT/CC Blog: A Security Comparison: Microsoft Office vs. Oracle Openoffice

Over on the post “CERT/CC Blog: A Security Comparison: Microsoft Office vs. Oracle Openoffice” contains this text: “A Security Comparison: Microsoft Office vs. Oracle Openoffice By Will Dormann on April 13, 2011 2:52 PM | Permalink Recently, Dan Kaminsky published a blog entry that compared the fuzzing resiliency of Microsoft Office and Oracle OpenOffice. This […]

Continue Reading →

Security Research Center – Network World

Over on the post “Security Research Center – Network World” contains this text: “Jack Hembrough, CEO of VaporStream, continues his discussion of controlling e-mail distribution which he started in the last column. Everything that follows is Mr. Hembrough’s own work with minor edits. * * * Have you ever responded to an e-mail, ‘Give me […]

Continue Reading →

Facebook password changed? Malware attack poses as message from Facebook support | Naked Security

Over on the post “Facebook password changed? Malware attack poses as message from Facebook support | Naked Security” contains this text: “Facebook password changed? Malware attack poses as message from Facebook support by Graham Cluley on April 13, 2011 | Be the first to comment FILED UNDER: Malware, Social networks, Spam Repeat after me: It’s […]

Continue Reading →

Popular cloud sync app raises security fears | Data security – InfoWorld

Over on the post “Popular cloud sync app raises security fears | Data security – InfoWorld” contains this text: “Popular cloud sync app raises security fears Dropbox makes it easy to sync files among devices, but a crucial weakness points to yet another soft spot in cloud security By Woody Leonhard | InfoWorld”

Continue Reading →

Legal issues in the Cloud – Part 4 – Truman Hoyle, privacy, legal, due dilligence, data sovereignty, data exit, cloud computing – CIO

Over on the post “Legal issues in the Cloud – Part 4 – Truman Hoyle, privacy, legal, due dilligence, data sovereignty, data exit, cloud computing – CIO” contains this text: “Legal issues in the Cloud – Part 4 There are no laws unique to the Cloud, but you must consider your exit strategy”

Continue Reading →