Change in Focus
Since its inception in 1999, SecurityFocus has been a mainstay in the security community. 2010-03-10 http://www.securityfocus.com/news/11582 PhotoDNA scans images for child abuse Microsoft and Dartmouth College donate a software tool for detecting modified images to help ISPs find child pornography on their networks. 2009-12-18 http://www.securityfocus.com/news/11570 Twitter attacker had proper credentials The social networking service's DNS provider says that all changes to its system were from an authenticated user. 2009-12-18 http://www.securityfocus.com/news/11569 Conficker data highlights infected networks The ShadowServer Foundation creates a portal highlighting which networks show significant signs of compromises, including networks in Vietnam, Indonesia, and Ukraine. 2009-12-16 http://www.securityfocus.com/news/11568 Popular apps need better patching, says report A report using data from two security vendors finds that ubiquitous applications, such as Apple's QuickTime and Adobe Flash, are not patched fast enough by their users. 2009-09-17 http://www.securityfocus.com/news/11560 Hacker charged with Heartland, other breaches A federal grand jury indicts a Florida man already charged with stealing data from TJX with allegedly helping breach five more companies. 2009-08-18 http://www.securityfocus.com/news/11557 Web attacks hit U.S., South Korean sites In its fourth day, a widespread distributed denial-of-service attack continued to inundate U.S. government and South Korean Web sites with network traffic. 2009-07-08 http://www.securityfocus.com/news/11554 FTC persuades court to shutter rogue ISP A federal district court shuts down Triple Fiber Network, after the Federal Trade Commission documents the Internet service provider's cooperation with online criminals and child pornographers. 2009-06-05 http://www.securityfocus.com/news/11552 Obama launches cybersecurity initiative The U.S. president announces that the nation's networks will be considered a "strategic national asset" and creates a top position in the White House to formulate a better cybersecurity policy. 2009-05-29 http://www.securityfocus.com/news/11551 Browsers bashed first in hacking contest A security researcher keeps a vulnerability on ice for an entire year, before using it at the Pwn2Own contest to exploit Apple's browser. Microsoft's Internet Explorer 8 falls soon after. 2009-03-18 http://www.securityfocus.com/news/11549 |
|
Privacy Statement |