Asteroid debate rises to next level

As of now, there’s no comet or asteroid that’s definitely due to smash into our planet, but experts say it’s high time to figure out how to deal with the uncertainties, misunderstandings and political wrangling that will inevitably arise during the asteroid alerts to come. View full post on computer…

read more

The Next Cyberwar

It is widely assumed that various nation-states and criminal organizations regularly engage in cyber-intelligence operations. Earlier this month, for instance, the U.S. Office of the National Counterintelligence Executive released a report (PDF) accusing Russia and China of using cyber-espionage to steal intellectual property and technology, among other things, from U.S….

read more

Duqu worm looms as ‘next big cyber threat’

The Duqu computer worm wiggled into the spotlight late last month. Here’s what you can do to make sure Duqu doesn’t infect your machine.  View full post on computer worm – Yahoo! News Search Results View full post on National Cyber Security » Virus/Malware/Worms Gregory Evans | LinkedIn Interview With…

read more

No Debit Fees; What Next?

BofA, Other Banks Retract Fees in Wake of Consumer BacklashOn Tuesday, Bank of America caved in to competitive and public pressure, reversing its decision to impose a fee for consumer debit transactions. So, now where will institutions find new revenue to help fight fraud? View full post on CUInfoSecurity.com RSS…

read more

Microsoft to patch 23 vulnerabilities next week

Microsoft will ship eight security updates next week to patch 23 vulnerabilities in Windows, Internet Explorer (IE) and several other products in its portfolio, the company announced this morning. Microsoft sketched out the upcoming patches in an advanced notice of Patch Tuesday’s line-up. Two of the eight updates, which Microsoft…

read more

The next frontier in fearing the iPad

Some in IT keep looking for another reason to say no to the world of consumerized IT; mobile DLP is their latest attempt to regain control Follow @MobileGalen In 2010, scaredy-cat IT and security folks wrung their hands over users bringing in their own smartphones and tablets. In early 2011,…

read more

For Hackers, the Next Lock to Pick

SAN FRANCISCO — Hackers have broken into the cellphones of celebrities like Scarlett Johansson and Prince William. But what about the rest of us, who might not have particularly salacious photos or voice messages stored in our phones, but nonetheless have e-mails, credit card numbers and records of our locations?…

read more