First of all, lemme say “Advance Happy New Year!” and I hope you guys are prepared for what is coming in 2012. The year 2011 will end soon and we sure will have a lot of misadventures. We just celebrated Christmas and ‘LulzXmas’, I hope you guys like your presents…
Asteroid debate rises to next level
As of now, there’s no comet or asteroid that’s definitely due to smash into our planet, but experts say it’s high time to figure out how to deal with the uncertainties, misunderstandings and political wrangling that will inevitably arise during the asteroid alerts to come. View full post on computer…
The Next Cyberwar
It is widely assumed that various nation-states and criminal organizations regularly engage in cyber-intelligence operations. Earlier this month, for instance, the U.S. Office of the National Counterintelligence Executive released a report (PDF) accusing Russia and China of using cyber-espionage to steal intellectual property and technology, among other things, from U.S….
Duqu worm looms as ‘next big cyber threat’
The Duqu computer worm wiggled into the spotlight late last month. Here’s what you can do to make sure Duqu doesn’t infect your machine. View full post on computer worm – Yahoo! News Search Results View full post on National Cyber Security » Virus/Malware/Worms Gregory Evans | LinkedIn Interview With…
No Debit Fees; What Next?
BofA, Other Banks Retract Fees in Wake of Consumer BacklashOn Tuesday, Bank of America caved in to competitive and public pressure, reversing its decision to impose a fee for consumer debit transactions. So, now where will institutions find new revenue to help fight fraud? View full post on CUInfoSecurity.com RSS…
Microsoft to patch 23 vulnerabilities next week
Microsoft will ship eight security updates next week to patch 23 vulnerabilities in Windows, Internet Explorer (IE) and several other products in its portfolio, the company announced this morning. Microsoft sketched out the upcoming patches in an advanced notice of Patch Tuesday’s line-up. Two of the eight updates, which Microsoft…
The next frontier in fearing the iPad
Some in IT keep looking for another reason to say no to the world of consumerized IT; mobile DLP is their latest attempt to regain control Follow @MobileGalen In 2010, scaredy-cat IT and security folks wrung their hands over users bringing in their own smartphones and tablets. In early 2011,…
For hackers, cellphone is the next lock to pick
Hackers have broken into the cellphones of celebrities like Scarlett Johansson and Prince William. View full post on cellphone security – Yahoo! News Search Results View full post on National Cyber Security
For Hackers, the Next Lock to Pick
SAN FRANCISCO — Hackers have broken into the cellphones of celebrities like Scarlett Johansson and Prince William. But what about the rest of us, who might not have particularly salacious photos or voice messages stored in our phones, but nonetheless have e-mails, credit card numbers and records of our locations?…
Nuclear warheads could be next Stuxnet target: Check Point
Due to the complexity and sophistication of the code contained within the Stuxnet worm, the possibility of it being used to take control of a nuclear warhead is high, according to a security expert. At Check Point’s Sydney conference this week, Check Point Israel security evangelist, Tomer Teller, said he…