Facebook privacy changes draw mixed reviews Facebook's revamped privacy settings will push more user data onto the Internet and, in some cases, make privacy protection harder for Facebook users, digital civil liberties experts said. Products of the week slideshow Our round-up of intriguing new products from 3Com, Sourcefire, BMC among others. Hackers find a home in Amazon's EC2 cloud Security researchers have spotted the Zeus botnet running an unauthorized command and control center on Amazon's EC2 cloud computing infrastructure. Lack of Telework Preparedness Threatens Business Continuity Research from Telework Exchange finds organizations expect employees to work from home in a pandemic, yet don't provide adequate resources Microsoft talks cloud computing security, plans to offer private cloud software Microsoft is looking to unveil a new security structure for multi-tenant cloud environments as well as private cloud software based on the same technology used to build the Azure cloud computing platform. H4ck3rs are people too: Film review During the 1990s, the term "hacker" became synonymous with "cracker," which is a person who performs some form of computer sabotage. The association is understandable. In order to be an effective cracker, you had to be a good hacker, thus the terms got intertwined, and hacker won out in the popular press. Symantec security, storage offerings now on Amazon's EC2 Businesses looking at using Amazon's Elastic Compute Cloud (EC2) for pay-as-you-go servers can now add Symantec security, backup and storage protection. TSA posts document on airport screening procedures online In a gaffe called "shocking" and "reckless" by some U.S. lawmakers, the Transportation Security Administration inadvertently posted online a 93-page document containing highly sensitive information on airport screening procedures. Guard Your Online Privacy With Firefox Addon As you browse the Web, Web sites watch you. Information is gathered about you, potentially shared with others, and possibly kept for a very long time. Which sites gather this information and which don't...and what do they do with the information? There's no practical way to know--unless you use TrackerWatcher, that is. This excellent, free Firefox add-on checks the privacy tracking features of Web sites you visit, and reports the results to you in great detail. Report predicts rise of self-defending botnets The world is not only losing the war against spam, the situation might be about to get a whole lot worse with the emergence of a new type of automatic botnet able to thrive without direct human control, Symantec's MessageLabs division has warned. NASA satellite; NSF telescope go on great space hunt They are taking two radically different approaches but NASA and the National Science Foundation (NSF) are prepping to significantly alter the way scientists explore space. Adobe fixes critical Flash Player flaws Adobe on Tuesday patched seven vulnerabilities in Flash Player, six of them for critical bugs that hackers could use to hijack Windows, Mac or Linux machines. Social network and banking scams are on the rise, says Cisco What do phishing, instant messaging malware, DDoS attacks and 419 scams have in common? According to Cisco Systems, they're all has-been cybercrimes that were supplanted by slicker, more menacing forms of cybercrime over the past year. McAfee appliance watches for network threats McAfee Tuesday unveiled a security appliance designed to monitor internal corporate traffic flows for worms, viruses and botnet activity in order to block outbreaks traced to corporate computers. How to fight malware Tests of five Web security gateways reveal that performing inline inspection of network traffic is a must, as is querying cloud-based databases of the latest malware. The current crop of anti-malware tools offers strong protection against spam, spyware, phishing, botnets, rootkits, viruses and other Internet-borne attacks. Cisco security survey:Cybercrime taking a page from business schools Cybercriminals are getting more professional, adopting classic business structures in the development and deployment of malware that is increasingly designed to reap maximum profit, according to the annual Cisco security report. Microsoft patches 12 bugs, including IE8-only flaws Microsoft today patched 12 vulnerabilities in Windows, Office and Internet Explorer, including three critical bugs in the company's newest browser, IE8. How to remove rootkits by hand Manually removing rootkit-based malware can be extremely difficult. You can't delete the offending Registry entries because the malware process is running. You halt the malware process, but Windows restarts the malware before you can delete the Registry entries. Many rootkits also set the Registry entries' owner to someone other than the user, thus complicating things further. New cloud-based service steals Wi-Fi passwords For US$34, a new cloud-based hacking service can crack a WPA (Wi-Fi Protected Access) network password in just 20 minutes, its creator says. Today from the Subnet communities On Cisco Subnet: Happy 25th Anniversary, Cisco and Five Shortcuts to PCI Compliance; On Microsoft Subnet: everRun 2G: Keeps your applications highly available On Google Subnet: Google adds discussion forums, e-mail lists to Google Apps Network World on Twitter? You bet we are |
No comments:
Post a Comment