1. uControl: Home Security 2.0

    Date: 03/14/09     Keywords: security

    Keeping your house secure is not always fun to think about. You have an alarm system, but it's usually dated, and not so easy to use. uControl makes the experience different. Imagine a touch screen monitor that lets you control the security of your home. Not only...

    Source: http://blogs.zdnet.com/weblife/?p=354

  2. Is privacy dead, or just very confused?

    Date: 03/14/09     Keywords: microsoft

    Panel: Siva Vaidhyanathan UVA, Alice Marwick NYU, Judith Donath MIT, Danah Boyd Microsoft Personal information is a form of currency. Privacy is not a substance. It's not something you can trade, or give up. People are willing to trade a little bit of privacy for a better...

    Source: http://blogs.zdnet.com/weblife/?p=338

  3. Botnets and illicit file swapping: the original "cloud computing"

    Date: 03/13/09     Keywords: no keywords

    The primary motives that are being cited for cloud computing, such as lower operational cost, scalability to elastic demand, and high availability, have all been addressed before in the underground. Have you ever heard of this thing called "Cloud Computing"? I have, and apparently it is...

    Source: http://blogs.zdnet.com/security/?p=2883

  4. My Astaro's rock

    Date: 03/12/09     Keywords: security

    We recently installed 3 Astaro 220 Security Gateways in locations that we upgraded to cable Internet connections. Our services integrator Integrity by CELT was able to bundle them via a lease with our Internet costs and gave me a couple of training sessions to manage them. While they...

    Source: http://education.zdnet.com/?p=2246

  5. BBC team buys a botnet, DDoSes security company Prevx

    Date: 03/12/09     Keywords: no keywords

    Update: BBC Click's tweet states that they took legal advice following comments on the potential violation of U.K's Computer Misuse Act. There's a slight chance that you may have unknowingly participated in a recent experiment conducted by the BBC. In a bit of an...

    Source: http://blogs.zdnet.com/security/?p=2868

  6. DDoS applications becoming democratized, tools of protest

    Date: 03/11/09     Keywords: no keywords

    In a presentation at SOURCE Boston, Dr. Jose Nazario of Arbor Networks stated that DDoS applications are moving from the domain of trained attackers to tools for the average person to voice a political statement. During his presentation, Nazario covered the major political DDoS events from the...

    Source: http://blogs.zdnet.com/security/?p=2859

  7. Security considerations for brands using Twitter

    Date: 03/11/09     Keywords: security

    There's a lot of chatter about Twitter security. But what responsibility lies on brands to make better decisions to protect their users. A lot. by Jennifer Leggio

    Source: http://blogs.zdnet.com/feeds/?p=664

  8. CIO Jury: Businesses need netbooks

    Date: 03/11/09     Keywords: security

    A jury of UK IT chiefs were almost split over whether netbooks were ready for the enterprise as the pro votes liked the price while the cons questioned security. Netbooks have received a qualified thumbs up by IT leaders in the latest CIO Jury. When...

    Source: http://news.zdnet.com/2424-9595_22-277700.html

  9. Microsoft given month reprieve in EU browser-bundling case

    Date: 03/11/09     Keywords: browser, microsoft

    Microsoft has petitioned for and been granted an extra month to reply to browser-bundling antitrust charges levied against it in Europe. by Mary Jo Foley

    Source: http://blogs.zdnet.com/microsoft/?p=2280

  10. Adobe PDF patch released, but only for some

    Date: 03/10/09     Keywords: software, security, microsoft

    After weeks of swinging and missing on proper response to a gaping security hole in its ever-present PDF Reader software, Adobe has finally shipped a patch but only for some affected users. On the same day Microsoft issued its scheduled batch of patches, Adobe dropped a security...

    Source: http://blogs.zdnet.com/security/?p=2856

  11. Microsoft fixes critical Windows kernel, WINS flaws

    Date: 03/10/09     Keywords: security, microsoft

    Microsoft today shipped three security bulletins with fixes for at least 8 documented vulnerabilities affecting millions of Windows OS users. The most serious of this month's patch batch is rated "critical" and could allow full remote execution attacks if a Windows user is simply lured into viewing...

    Source: http://blogs.zdnet.com/security/?p=2853

  12. New study details the dynamics of successful phishing

    Date: 03/10/09     Keywords: security

    Can you teach an old employee new phishing protection tricks? In a recently presented study by the Intrepidus Group, the company behind the PhishMe.com spear phishing awareness service allowing companies to ethically attempt to phish their employees on their way to build security awareness, presents some interesting...

    Source: http://blogs.zdnet.com/security/?p=2846

  13. So I followed all the prompts in AV 360

    Date: 03/10/09     Keywords: software

    AV360 is a fun little piece of malware that looks to the average end user like an anti-malware program. It's not exactly new, but it certainly seems to be making the rounds. Most commercial anti-malware software doesn't catch it, although we haven't had any problems at sites with...

    Source: http://education.zdnet.com/?p=2238

  14. International Kaspersky sites susceptible to SQL injection attacks

    Date: 03/10/09     Keywords: asp, sql, security, web

    According to a security group going under the name of TeamElite, the international sites of Kaspersky Iran (kasperskylabs.ir), Taiwan (web.kaspersky.com.tw) and South Korea (kasperskymall.co.kr) are susceptible to SQL injection attacks, allowing the injection of malicious iFrames and potentially assisting malicious attackers into obtaining sensitive data from the web sites in...

    Source: http://blogs.zdnet.com/security/?p=2842

  15. Cyber security chief quits over power struggle with NSA

    Date: 03/09/09     Keywords: security

    Rod Beckworth quits after a year on the job, saying he won't be subjugated to National Security Agency. But does Obama support NSA dominance here? by Richard Koman

    Source: http://government.zdnet.com/?p=4448

  16. MySpace using Cloudmark anti-spam for in-network abuse

    Date: 03/09/09     Keywords: technology, security, spam

    Last week Twitter user Fausto Cepeda asked Ryan if we could go beyond discussing straight security news and talk about product and technology trends on the blog. It was perfect timing. Cloudmark (disclosure: yes, this is my employer) has announced that they have been providing anti-spam...

    Source: http://blogs.zdnet.com/security/?p=2834

  17. TouchDown provides push email for the T-Mobile G1 Android device

    Date: 03/09/09     Keywords: google

    I've written about TouchDown for the Google Android a couple of times here and here and as I have said in those posts it gets better and better on a regular basis. I have been using beta versions and the latest available beta supports PUSH email, ability to send attachments,...

    Source: http://blogs.zdnet.com/cell-phones/?p=856

  18. U.S.'s cybersecurity director has resigned.

    Date: 03/09/09     Keywords: security

    Rod Beckstrom, an author and Silicon Valley entrepreneur, has resigned the position of National Director of Cybersecurity. Mr. Beckstrom's position, which reported to the head of DHS, involved wrestling the all of the different Federal agencies into forming a coherent cybersecurity policy. His role...

    Source: http://blogs.zdnet.com/security/?p=2832

  19. Russia kinda-sorta owns up to Estonia cyberwar

    Date: 03/08/09     Keywords: security

    Radio Free Europe is reporting that an official from Putin's party has publicly stated that he orchestrated the 2007 DDoS Attacks on Estonia. The information security and military communities have been speculating for the past two years about who were the primary actors behind the 2007 Estonian...

    Source: http://blogs.zdnet.com/security/?p=2828

  20. Twitter and identity theft

    Date: 03/06/09     Keywords: security

    Someone hacked the Twitter account of ZDNet colleague, Dennis Howlett, exposing security as a serious Twitter weakness. by Michael Krigsman

    Source: http://blogs.zdnet.com/projectfailures/?p=2229

  ||  Next page


antivirus | apache | asp | blogging | browser | bugtracking | cms | crm | css | database | ebay | ecommerce | google | hosting | html | java | jsp | linux | microsoft | mysql | offshore | offshoring | oscommerce | php | postgresql | programming | rss | security | seo | shopping | software | spam | spyware | sql | technology | templates | tracker | virus | web | xml | yahoo | home