News (Page 4 of 238)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >
Obama launches cybersecurity initiative
The U.S. president announces that the nation's networks will be considered a "strategic national asset" and creates a top position in the White House to formulate a better cybersecurity policy.
By: Robert Lemos, SecurityFocus 2009-05-29
http://www.securityfocus.com/news/11551

OpenSSH chink bares encrypted data packets
Cryptographers urge users of the widely employed network protocol to make sure they're running the latest version.
By: Dan Goodin, The Register 2009-05-22
http://www.securityfocus.com/news/11550

Browsers bashed first in hacking contest
A security researcher keeps a vulnerability on ice for an entire year, before using it at the Pwn2Own contest to exploit Apple's browser. Microsoft's Internet Explorer 8 falls soon after.
By: Robert Lemos, SecurityFocus 2009-03-18
http://www.securityfocus.com/news/11549

Experts: U.S. needs to defend its "cyber turf"
The United States must develop a Monroe Doctrine for the Internet, defining what constitutes its cyberspace and pledging to defend its virtual borders, security experts told Congress.
By: Robert Lemos, SecurityFocus 2009-03-11
http://www.securityfocus.com/news/11548

Advisor: U.S. needs policy to defend cyberspace
An Obama transition-team member argues that any future cyber policy needs to deal with the role of the intelligence community, the militarization of cyberspace and designating a lead disaster agency.
By: Robert Lemos, SecurityFocus 2009-02-19
http://www.securityfocus.com/news/11547

Cabal forms to fight Conficker, offers bounty
Microsoft offers $250,000 for information leading to the arrest of the author and, along with security firms and Internet service providers, pledges to work to prevent the prolific worm from spreading further.
By: Robert Lemos, SecurityFocus 2009-02-13
http://www.securityfocus.com/news/11546

Kaspersky exposes sensitive database, says hacker
A security lapse at the firm has exposed a wealth of proprietary information about the company's products and customers, a blogger claims.
By: Dan Goodin, The Register 2009-02-09
http://www.securityfocus.com/news/11545

RFID passports cloned wholesale
Using relatively inexpensive components, an information security expert has built a mobile platform that can clone large numbers of the unique electronic identifiers used in U.S. passport cards and next-generation drivers licenses.
By: Dan Goodin, The Register 2009-02-04
http://www.securityfocus.com/news/11544

Mac OS X research warns of stealthier attacks
A security researcher finds a way to inject hostile code directly into the memory of Macs in a way that makes it significantly harder for investigators to detect attacks.
By: Dan Goodin, The Register 2009-01-22
http://www.securityfocus.com/news/11543

Group releases list to kill most-dangerous bugs
Software makers, security vendors, and government agencies team up to create a list of the 25 most severe software issues, aiming to get developers to stop making mistakes.
By: Robert Lemos, SecurityFocus 2009-01-13
http://www.securityfocus.com/news/11542

News (Page 4 of 238)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus