1. Cyber-Storm II is blowing through DC

    Date: 03/11/08 (Security)    Keywords: technology, security

    It's time, once again, for Cyber Storm, the "the largest-ever exercise designed to evaluate the mettle of information technology experts and incident response teams" from 18 federal agencies and nine states, The Washington Post. Jerry Dixon, a former director of the National Cyber Security Division...

    Source: http://government.zdnet.com/?p=3697

  2. Microsoft updates Mac Office 2008, 2004

    Date: 03/12/08 (Security)    Keywords: security, microsoft

    Redmond pushes security fixes for users of the older Microsoft Office 2004 for Mac, while owners of the recently released Office 2008 receive a large dose of stability fixes (more like instability fixes) and security patches. Microsoft's Mac Business Unit informed us via the corporate...

    Source: http://blogs.zdnet.com/Apple/?p=1400

  3. IE 8: Threats will evolve to elude Microsoft's new security features

    Date: 03/13/08 (Security)    Keywords: security, microsoft

    As most of the tech world knows, IE 8 has landed with its first beta, but the security improvements may raise some other issues to ponder. Folks--especially security researchers--are kicking the tires on IE 8 (all resources) and finding a few problems that go along with Microsoft's...

    Source: http://blogs.zdnet.com/security/?p=944

  4. Got room in your heart for a hacker?

    Date: 03/13/08 (Security)    Keywords: security

    I was looking over famed security researcher and cryptography expert Bruce Schneier's blog today and found an article on hacking medical devices.  I have to admit that I was surprised, but I shouldn't have been.  These days, if you can build it, we can break it seems to be the...

    Source: http://blogs.zdnet.com/security/?p=948

  5. Adobe plugs vulnerabilities for Form Designer, ColdFusion, Reader

    Date: 03/13/08 (Security)    Keywords: security

    Adobe this week issued security bulletins and patches for products ranging from ColdFusion to Form Designer. In Adobe's security bulletin the company outlined the following in order of importance: CVE--2007-6253:  Adobe says "critical vulnerabilities have been identified in Form Designer 5.0 and Form Client...

    Source: http://blogs.zdnet.com/security/?p=947

  6. Personal information of Harvard grad students compromised

    Date: 03/13/08 (Security)    Keywords: security

    Harvard's graduate school of arts and sciences said that roughly 10,000 individuals may have had their personal information compromised by a security breach. The intrusion was discovered in February, according to a Harvard statement released Wednesday. Of the 10,000 affected, 6,600 got a year's worth of free...

    Source: http://blogs.zdnet.com/security/?p=945

  7. Trend Micro falls victim to Web hack

    Date: 03/14/08 (Security)    Keywords: security, web

    It's not much fun when one of your security vendors falls to a Web attack. Infoworld reports that TrendMicro was a victim of a recent Web attack that used legit sites to deliver malware. According to InfoWorld Trend Micro removed the infected pages from its Web site....

    Source: http://blogs.zdnet.com/security/?p=953

  8. Someone get me rewrite: Apple delivers monster security update for OS X

    Date: 03/18/08 (Security)    Keywords: security

    Apple delivered a security update for Tiger and Leopard Tuesday with at least 80 patches addressing multiple vulnerabilities. You know it's a big patch haul from Apple when you read the advisory and: You're not sure where to begin; You're IMing fellow security...

    Source: http://blogs.zdnet.com/security/?p=963

  9. Major flaw in State of Pennsylvania online voter registration puts user data at risk

    Date: 03/19/08 (Security)    Keywords: security

    Ok security people, we've been talking about it for awhile now, and here it is! Do you remember when you first heard about online voting? Do you remember thinking, geez, that sounds like a really bad idea? Well, your fears are confirmed. The state...

    Source: http://blogs.zdnet.com/security/?p=965

  10. Security Update 2008-002 released

    Date: 03/19/08 (Security)    Keywords: software, security

    Apple yesterday released Security Update 2008-002 (50.5MB) for Mac OS 10.4.11 and 10.5.2. The update, which appears in Software Update, is recommended "for all users and improves the security of Mac OS X." The previous 2008-001 Security Update is incorporated into this update and a restart is...

    Source: http://blogs.zdnet.com/Apple/?p=1434

  11. Security update breaks printer drivers, Instant Hijack component

    Date: 03/19/08 (Security)    Keywords: software, security

    Discussion boards are breaking with reports of SSH and printer problems caused by Apple's late Tuesday release of Mac OS X's Security Update 2008-002. However, fixes can be had. Rogue Amoeba Software released a compatibility fix for its Instant Hijack component that is often installed by the...

    Source: http://blogs.zdnet.com/Apple/?p=1437

  12. F-Secure warns of critical vulnerabilities

    Date: 03/19/08 (Security)    Keywords: security

    Security vendor F-Secure says malformed archive files can cause its own and other vendors' products to break and crash. Security vendor F-Secure has warned of multiple critical vulnerabilities in its own and other vendors' products. The vulnerabilities exist in the way the products respond to malformed...

    Source: http://news.zdnet.com/2424-1009_22-193117.html

  13. Apple's week of patching: Camera compatibility flaw patched

    Date: 03/20/08 (Security)    Keywords: security

    Apple on Friday shipped a security update for Aperture 2, iPhoto 7.1.2 with iLife Support 8.2. Here's what Apple had to say in an advisory about CVE-2008-0987: Viewing a maliciously crafted image may lead to an unexpected application termination or arbitrary code execution Description: ...

    Source: http://blogs.zdnet.com/security/?p=969

  14. Microsoft inches toward public beta of 'Stirling' security suite

    Date: 03/20/08 (Security)    Keywords: security, microsoft

    It's been a while since Microsoft has shared information on "Stirling," the all-in-one security suite the company is assembling. Microsoft is planning to release a public beta of Stirling -- the suite of Forefront client, server and edge security products, wrapped in a unified management and reporting...

    Source: http://blogs.zdnet.com/microsoft/?p=1284

  15. Microsoft acquires rootkit specialist Komoku; DoD now a customer

    Date: 03/20/08 (Security)    Keywords: software, technology, security, microsoft

    Microsoft on Thursday acquired Komoku, which provides rootkit detection software, for an undisclosed sum. Komoku's technology will be added to Microsoft's enterprise-focused Forefront and Windows Live OneCare security software. Komoku counts the Department of Homeland Security and the Department of Defense as customers and gives Microsoft's anti-malware...

    Source: http://blogs.zdnet.com/security/?p=968

  16. Red Hat takes the open source security challenge

    Date: 03/21/08 (Security)    Keywords: security

    One big hole for open source lies in security. It's not a real hole. It's a meta-hole. But we still view it as a hole, so it's a hole. That hole opened up again in Australia this week, where a "loud minority" got personal...

    Source: http://blogs.zdnet.com/open-source/?p=2156

  17. Mozilla CEO accuses Apple of malware distribution practices

    Date: 03/22/08 (Security)    Keywords: software, security, web

    Yesterday Apple pushed out a Safari 3.1 update via Software Update on Windows. In a blog post, Mozilla CEO John Lilly describes why Mozilla feels Apple's decision is wrong -- and how moves like it can endanger the security of the Web. From John Lilly's blog: What Apple...

    Source: http://blogs.zdnet.com/Apple/?p=1451

  18. Security: Lintel vs Wintel

    Date: 03/24/08 (Security)    Keywords: security

    In the PC community "security" just means defending against attacks aimed at destroying or misusing all or part of a computer system. In that context most of the complexities associated with trying to decide whether wintel or lintel will expose you to less security risk arise from the absense of...

    Source: http://blogs.zdnet.com/Murphy/?p=1100

  19. wireless router not so wireless

    Date: 03/27/08 (Computer Help)    Keywords: security

    I have a basic dlink wireless router. connected to it wired I have a PC and a 360, wireless is another 360. I had the router configured originally when I had no PC. Now I just got one 2 weeks ago. My husband and I were not playing xbox at the same time until 2 days ago. now, wireless xbox, was lagging badly, kicked me offline. (btw, I never have my pc on when I game) Then I tried to get back online and was repeatedly testing the connection, sometimes showing a wireless connect w/ an IP or ICMP fail and mostly just showing no wireless connect. Then miraculously, it connects and I play just fine for about 2 hours. Next night, lag is worse, kicks me and I can't get back online. I called DLink, they said it was my xbox. Called XBOX, they said it was my router. My xbox did work when I moved it and had it wired to the modem. They had me change so many letters numbers and codes between the 2 tech support calls I just said screw it and put everything back to factory settings, Both XBOXs and reset the router. I have power cycled a hundred times, everything at once even. Now, the pc and wired xbox are fine. Wireless xbox still not recognizing any connection. But it shows my wireless network having a signal in the settings menu. I have also typed in my security key and everything. I had a friend tell me to pull my IP address from my PC and input to wireless xbox, still saying wireless network : not connected.

    I have considered just buying a new router upgrading a bit and starting from scratch. Any router suggestions would be great. If you can just fix this that would be awesome too.

    Source: http://community.livejournal.com/computer_help/873814.html

  20. EMC, Verint team up on physical security

    Date: 03/27/08 (Security)    Keywords: software, security

    EMC said Thursday that it is partnering with Verint to offer physical security services.Verint provides IP video security software and dashboards. EMC will offer services for companies looking to design and manage physical security information management. The move by EMC and Verint highlight how information and physically...

    Source: http://blogs.zdnet.com/security/?p=982

Previous page  ||  Next page


antivirus | apache | asp | blogging | browser | bugtracking | cms | crm | css | database | ebay | ecommerce | google | hosting | html | java | jsp | linux | microsoft | mysql | offshore | offshoring | oscommerce | php | postgresql | programming | rss | security | seo | shopping | software | spam | spyware | sql | technology | templates | tracker | virus | web | xml | yahoo | home