Featured News Posts

Recent News

Layer 2 DoS and other IPv6 Tricks

Over on the post “Layer 2 DoS and other IPv6 Tricks” contains this text: “IPv6, just like IPv4, is a layer 3 (Network Layer) protocol. However, it does depend on Layer 2 (Link Layer) to reach the next hop. Historically, Layer 2 has been a fertile attack breeding ground. Layer 2 protocols like Ethernet do […]

Continue Reading →

Policy-based security and access control

Over on the post “Policy-based security and access control” contains this text: “Policy-based security and access control SUNY Old Westbury’s CIO talks about the school’s policy-based approach to securing the network and controlling bandwidth use By Joan Goodchild, CSO April 05, 2011 06:07 PM ET Comment Print In a university environment, there is no time […]

Continue Reading →

State of Texas exposes data on 3.5 million people | Naked Security

Over on the post “State of Texas exposes data on 3.5 million people | Naked Security” contains this text: “State of Texas exposes data on 3.5 million people by Chester Wisniewski on April 12, 2011 | Comments (7) FILED UNDER: Privacy, Data loss, Featured Susan Combs, Comptroller for the state of Texas announced a massive […]

Continue Reading →

Electronic messaging inherently insecure

Over on the post “Electronic messaging inherently insecure” contains this text: “Jack Hembrough, CEO of VaporStream, recently wrote to me with some interesting ideas. We corresponded about the problem of controlling e-mail distribution, and this article and the next are the results of our conversation. Everything that follows is Mr Hembrough’s own work with minor […]

Continue Reading →

Virus That Blocks Itself

Over on F-Secure Antivirus Research Weblog the post “Virus That Blocks Itself” contains this text: “Virus:W32/Ramnit is no stranger to many malware analysts/researchers, as it was in the wild back in 2010. Other malware researchers have blogged about the technical details of this interesting virus (here and here, for example); however there are still some […]

Continue Reading →

Limit Flash Exploit Exposure, Uninstall ActiveX Version – F-Secure Weblog : News from the Lab

Over on the post “Limit Flash Exploit Exposure, Uninstall ActiveX Version – F-Secure Weblog : News from the Lab” contains this text: ” <<< Tuesday, April 12, 2011   Limit Flash Exploit Exposure, Uninstall ActiveX Version Posted by Sean @ 15:27 GMT | Comments Yesterday, Adobe issued Security Advisory APSA11-02. The advisory states that: "A […]

Continue Reading →

Hackers Attack Web Sites of Russian Paper, Blog

Over on Enterprise Security Today the post “Hackers Attack Web Sites of Russian Paper, Blog” contains this text: “A cyber attack on Friday paralyzed the Web site of a popular Russian independent newspaper, days after similar attacks knocked out Russia’s most popular blogging site. The Novaya Gazeta newspaper’s Web site went down early Friday after […]

Continue Reading →

US Navy Now Zapping Boats

Over on Defense Tech the post “US Navy Now Zapping Boats” contains this text: “ The Navy and Northrop Grumman announced yesterday that for the first time a program that integrates solid state lasers on naval vessel had engaged another boat moving across the water. I realize this was reported yesterday, but I wanted to […]

Continue Reading →

U.S. police increasingly view private email, instant messages – Computerworld

Over on the post “U.S. police increasingly view private email, instant messages – Computerworld” contains this text: “Skip the navigation Home > Government/Industries > IT in Government News U.S. police increasingly view private email, instant messages By Jeremy Kirk April 12, 2011 09:33 AM ETComments (1)Recommended (3) IDG News Service – Law enforcement organizations are […]

Continue Reading →

T.J.Maxx hacker says feds gave him the OK | InSecurity Complex – CNET News

Over on the post “T.J.Maxx hacker says feds gave him the OK | InSecurity Complex – CNET News” contains this text: ” CNETNews log in join CNET Home Reviews You are here:News Downloads Video Latest News Webware Crave Business Tech Green Tech Wireless Security Blogs Video Photos More Menu Home News InSecurity Complex InSecurity Complex […]

Continue Reading →