|
Analyst: Security elusive in the "cloud"
The worldwide economic slowdown has many companies looking to outsource various aspects of their business to the Internet "cloud." Will security suffer? 2009-03-16 Read more ... | Comment(s) | Post Comment Better metrics needed for security, says expert Companies are better off collecting as many metrics as possible and then trying to find the proper measures of security, says a former DHS cyber chief. 2009-03-13 Read more ... | Comment(s) | Post Comment Cyber conflict? More like censorship Many of the international denial-of-service attacks of the last decade amount to nationalist hackers silencing perceived enemies, says one network security specialist. 2009-03-12 Read more ... | Comment(s) | Post Comment Microsoft patches image, DNS flaws The software giant closes eight security holes, including a single critical flaw in the way the Windows kernel handles image files. 2009-03-10 Read more ... | Comment(s) | Post Comment Conficker update attempts to foil Cabal A module that updates the Conficker worm could cause problems for the group that wants to shutdown the would-be botnet. 2009-03-09 Read more ... | Comment(s) | Post Comment Cybersecurity chief resigns, dings NSA The director of the National Cybersecurity Center tenders his resignation, blaming problems on a lack of support from the Department of Homeland Security and meddling by the National Security Agency. 2009-03-07 Read more ... | Comment(s) | Post Comment White House to wrap up cyber review in April Proposed changes will focus on defending cyber infrastructure and services without weakening civil liberties, a top advisor to the President Obama states. 2009-03-06 Read more ... | Comment(s) | Post Comment Bot master sentenced to four years A federal judge slaps a former security consultant with a 48-month prison sentence for infecting hundreds of thousands of computers and stealing victim's personal information. 2009-03-05 Read more ... | Comment(s) | Post Comment Mozilla, Opera plug security holes Both browser companies release updated versions of their software to eliminate serious security vulnerabilities. 2009-03-05 Read more ... | Comment(s) | Post Comment War dialing gets an upgrade The co-founder of the Metasploit Project readies software to speed up war dialing by using voice-over-IP lines and storing audio to determine who or what answers the phone at each number. 2009-03-04 Read more ... | Comment(s) | Post Comment |
|
Privacy Statement |