blog trackingRealtime Web Statistics impact Archives - Gregory D. Evans | Worlds No. 1 Security Consultant

Posts Tagged ‘impact’

SAP CEO – Snowden and its impact on cloud security


July 18 – German software giant SAP says its ability to guarantee the security of cloud-based data in Europe is giving it a competitive advantage, but warns …

________________________

http://gregorydevans.com – http://gregorydevans.wordpress.com – http://hackerforhire.com – http://hackerforhireusa.com

Everywhere, All the Time: The Impact of Mobile Devices on Cloud Security

National Cyber Security

Read More….

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Everywhere, All the Time: The Impact of Mobile Devices on Cloud Security appeared first on National Cyber Security.

View full post on National Cyber Security

Hikvision wins a prestigious maximum impact award

Top Priority Sector:  video_surveillance_cctv Hikvision, the City of Industry, CA, producer of video surveillance technologies, has been named winner of the Maximum Impact Award at the ESX 2014 Expo in the Digital Recording Systems category of Video Security for its “plug and play” NVR (model DS-7716NI-SP/16). Read More….

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Hikvision wins a prestigious maximum impact award appeared first on National Cyber Security.

View full post on National Cyber Security

Government shutdown had remarkably broad impact across U.S., survey finds

Top Priority Sector:  federal_agencies_legislative The 16-day shutdown of the U.S. Government in October 2013 had widespread business and personal impacts that reached far beyond the federal sector and well outside the Washington, D. Read More….

View full post on The Cyber Wars

Coast Guard undertaking market research on ‘non-lethal impact munitions’

Jacob Goodwin Top Priority Sector:  maritime_port_security Read More….

View full post on The Cyber Wars

Oklahoma Tornado Impact on Social Media

________________________

http://gregorydevans.com – http://gregorydevans.wordpress.com – http://hackerforhire.com – http://hackerforhireusa.com

Campaigning on Prostitution – Campaign! Make an Impact Project

Students from Bradford Academy, Bradford, UK, present their short campaign video on Prostitution. Part of the “Campaign! Make an Impact” initiative made in c… Read More….

View full post on Select From Our Menu

InfosecIsland: Turn Compliance Beliefs Into Action: Impact Tone at the Bottom http://t.co/BdNUCdFH

InfosecIsland: Turn Compliance Beliefs Into Action: Impact Tone at the Bottom http://t.co/BdNUCdFH
View full post on Twitter / InfosecIsland

View full post on National Cyber Security

VMware virtualisation source code stolen, but impact unclear

VMware ESX source code has been stolen and posted online, but the company says its virtualisation platform doesn’t necessarily pose an increased risk to customers.

The stolen code amounts to a single file from sometime around 2003 or 2004, the company said.

“The fact that the source code may have been publicly shared does not necessarily mean that there is any increased risk to VMware customers,” according to a blog written by Iain Mulholland, director of the company’s Security Response Center.

The code was stolen from a Chinese company called China Electronics Import Export Corporation (CEIEC) during a March breach, according to a posting on the Kaspersky Threat Post blog.

The code along with internal VMware emails were posted online three days ago.

Eric Chiu, president of virtualisation security firm Hytrust, says it’s hard to say what VMware customers should do because there’s not enough detail about how the exposed code is being used in current products.

In general, though, customers should review the security for virtual environments to address the fact that a compromised hypervisor exposes multiple virtual machines.

While the incident is reminiscent of the breach last year of RSA source code, the circumstances differ. An RSA partner was breached and that breach was used to send a malware-laced email to an RSA staffer who opened it.

In VMware’s case, the CEIEC network was hacked and finding the source code was fortuitous.

VMware said: “On April 23, 2012, our security team became aware of the public posting of a single file from the VMware ESX source code and the possibility that more files may be posted in the future. The posted code and associated commentary dates to the 2003 to 2004 timeframe.

“The fact that the source code may have been publicly shared does not necessarily mean that there is any increased risk to VMware customers. VMware proactively shares its source code and interfaces with other industry participants to enable the broad virtualization ecosystem today. We take customer security seriously and have engaged internal and external resources, including our VMware Security Response Center, to thoroughly investigate. We will continue to provide updates to the VMware community if and when additional information is available.”

Article source: http://rss.feedsportal.com/c/270/f/3551/s/1ec139e3/l/0Lnews0Btechworld0N0Csecurity0C33539640Cvmware0Evirtualisation0Esource0Ecode0Estolen0Ebut0Eimpact0Eunclear0C0Dolo0Frss/story01.htm

View full post on National Cyber Security » Computer Hacking

2012 Verizon DBIR: Hacktivists make impact on data breach statistics

The Verizon DBIR says hacktivists conduct opportunistic attacks targeting mainly large businesses using tactics akin to a smash-and-grab burglary, stealing any data they can access.

Add to digg
Add to StumbleUpon
Add to del.icio.us
Add to Google


View full post on SearchSecurity: Security Wire Daily News

View full post on National Cyber Security

Page 1 of 212»

Get The New Book By Gregory Evans

Everyone Is Talking About!

Are You Hacker Proof?
$15.95

Find Out More, Click Here!