blog trackingRealtime Web Statistics impact Archives - Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘impact’

Government shutdown had remarkably broad impact across U.S., survey finds

Top Priority Sector:  federal_agencies_legislative The 16-day shutdown of the U.S. Government in October 2013 had widespread business and personal impacts that reached far beyond the federal sector and well outside the Washington, D. Read More….

View full post on The Cyber Wars

Coast Guard undertaking market research on ‘non-lethal impact munitions’

Jacob Goodwin Top Priority Sector:  maritime_port_security Read More….

View full post on The Cyber Wars

Oklahoma Tornado Impact on Social Media

________________________

http://gregorydevans.com – http://gregorydevans.wordpress.com – http://hackerforhire.com – http://hackerforhireusa.com

Campaigning on Prostitution – Campaign! Make an Impact Project

Students from Bradford Academy, Bradford, UK, present their short campaign video on Prostitution. Part of the “Campaign! Make an Impact” initiative made in c… Read More….

View full post on Select From Our Menu

InfosecIsland: Turn Compliance Beliefs Into Action: Impact Tone at the Bottom http://t.co/BdNUCdFH

InfosecIsland: Turn Compliance Beliefs Into Action: Impact Tone at the Bottom http://t.co/BdNUCdFH
View full post on Twitter / InfosecIsland

View full post on National Cyber Security

VMware virtualisation source code stolen, but impact unclear

VMware ESX source code has been stolen and posted online, but the company says its virtualisation platform doesn’t necessarily pose an increased risk to customers.

The stolen code amounts to a single file from sometime around 2003 or 2004, the company said.

“The fact that the source code may have been publicly shared does not necessarily mean that there is any increased risk to VMware customers,” according to a blog written by Iain Mulholland, director of the company’s Security Response Center.

The code was stolen from a Chinese company called China Electronics Import Export Corporation (CEIEC) during a March breach, according to a posting on the Kaspersky Threat Post blog.

The code along with internal VMware emails were posted online three days ago.

Eric Chiu, president of virtualisation security firm Hytrust, says it’s hard to say what VMware customers should do because there’s not enough detail about how the exposed code is being used in current products.

In general, though, customers should review the security for virtual environments to address the fact that a compromised hypervisor exposes multiple virtual machines.

While the incident is reminiscent of the breach last year of RSA source code, the circumstances differ. An RSA partner was breached and that breach was used to send a malware-laced email to an RSA staffer who opened it.

In VMware’s case, the CEIEC network was hacked and finding the source code was fortuitous.

VMware said: “On April 23, 2012, our security team became aware of the public posting of a single file from the VMware ESX source code and the possibility that more files may be posted in the future. The posted code and associated commentary dates to the 2003 to 2004 timeframe.

“The fact that the source code may have been publicly shared does not necessarily mean that there is any increased risk to VMware customers. VMware proactively shares its source code and interfaces with other industry participants to enable the broad virtualization ecosystem today. We take customer security seriously and have engaged internal and external resources, including our VMware Security Response Center, to thoroughly investigate. We will continue to provide updates to the VMware community if and when additional information is available.”

Article source: http://rss.feedsportal.com/c/270/f/3551/s/1ec139e3/l/0Lnews0Btechworld0N0Csecurity0C33539640Cvmware0Evirtualisation0Esource0Ecode0Estolen0Ebut0Eimpact0Eunclear0C0Dolo0Frss/story01.htm

View full post on National Cyber Security » Computer Hacking

2012 Verizon DBIR: Hacktivists make impact on data breach statistics

The Verizon DBIR says hacktivists conduct opportunistic attacks targeting mainly large businesses using tactics akin to a smash-and-grab burglary, stealing any data they can access.

Add to digg
Add to StumbleUpon
Add to del.icio.us
Add to Google


View full post on SearchSecurity: Security Wire Daily News

View full post on National Cyber Security

Social Security increase could have big impact

The Social Security Administration’s recent announcement of a 3.6 percent increase in benefits could have a significant impact on DeKalb County’s economy.

View full post on could security – Yahoo! News Search Results

View full post on National Cyber Security

Gergory Evans

New ISO standard for pedestrian impact test drives progress in safety

people crossing roadThe number of pedestrian leg injuries caused by dangerous car design should be reduced thanks to an ISO International Standard defining a new crash test method.

View full post on ISO – Latest News

View full post on National Cyber Security

Report: Computer virus hits US Air Force drone program; Pentagon mum on impact

More on this Story

View all Items in this Story

Article source: http://www.washingtonpost.com/business/technology/report-computer-virus-hits-us-air-force-drone-program-pentagon-mum-on-impact/2011/10/08/gIQAJ92qVL_story.html?wprss=rss_national

View full post on National Cyber Security » Spyware/ Cyber Snooping

Gregory Evans | LinkedIn

Interview With Gregory Evans

Gregory Evans Security Expert

Gregory Evans on Cyber Crime

Get The New Book By Gregory Evans

Everyone Is Talking About!

Are You Hacker Proof?
$15.95

Find Out More, Click Here!