Collegiate Cyber Defense Competitions |
03/31/2010
|
|
CCDC competitions are becoming
more and more common! Teaching students to defend against cyber attacks.
|
Poisoned Dumplings |
03/30/2010
|
|
A man has been arrested in China
accused of poisoning dumplings in a case which led to a diplomatic rift
with Japan, state media reports.
Temporary factory worker Lu Yueting, 36, allegedly put insecticide in
some frozen dumplings because he was unhappy with his pay and
colleagues.
|
Student Loan Data Stolen |
03/29/2010
|
|
A Minnesota company that
guarantees federal student loans... is working with police to figure out
who stole personal information on three-point-three million
borrowers.The Educational Credit Management Corporation is based in
suburban Saint Paul and is a contractor for the U-S Department of
Education.Company C-E-O Richard Boyle says the theft was discovered last
week when security found something odd in a hallway.
|
New Version of RSS2HTML |
03/29/2010
|
|
A new version of RSS2HTML
php script is now available. It includes an update for PHP 5.3.
|
Google and Privacy |
03/28/2010
|
|
Google is not exactly known for
its respect for privacy, but a recent blog post shows the search giant
may be attempting to turn a new leaf on what has been called an irresponsible
stance on user privacy. Maybe.
The Google Analytics team has been working to give users a choice on how
their Internet browsing data is collected by the analytics and
marketing tool, according to a blog post by Amy Chang, group product
manager.
|
Malware on Phone Memory Cards |
03/27/2010
|
|
Malware-tainted memory cards may
have ended up on as many as 3,000 HTC Magic phones, a greater number
than first suspected, Vodafone said Friday.
The problem came to light earlier this month after an employee of Panda
Security plugged a newly ordered phone into a Windows computer, where it
triggered an alert from the antivirus software.
|
Software Industry Conference $229 per
person for only |
03/26/2010
|
|
The Software Industry Conference
July 15-17th in Dallas, Texas has invitations available for only
$229.00 on April 1st the price of attendance will increase. Register Now.
|
Free Web Security Scanner |
03/26/2010
|
|
Google on Friday released an
automated Web security scanning program called skipfish to help reduce
online security vulnerabilities.
|
Drones for Border Security |
03/24/2010
|
|
The federal government may soon
send unmanned aircraft to scour West Texas and the states coastal waters
in an effort to boost border security, U.S. Homeland Security Secretary
Janet Napolitano said in a letter to the governor sent Friday.
|
20 Zero Day Flaws in Mac OS X |
03/23/2010
|
|
Charles Miller, a computer
security researcher who's worked with the NSA, is planning to reveal 20
zero-day security holes in Mac OS X at CanSecWest, a digital security
conference, in Vancouver BC this week.
|
Cybercriminals |
03/22/2010
|
|
Cybercriminals have been
spreading malware by targeting the subjects users are most interested
in. From the Facebook Password Reset Scam to basketball and gossip, web
users are getting infected. Basketball brackets are promoting malware
and hackers are getting their sites ranked high in searches about Sandra
Bullock's marriage woes.
|
Moving Nuclear Weapons |
03/18/2010
|
|
The US is taking a go-slow
approach on one of the touchiest and least discussed national security
issues: Whether to remove the last remaining Cold War-era US nuclear
weapons in Europe.
Some officials in Germany and other US allies in Europe are advocating a
withdrawal, citing President Barack Obama's call last year for a
nuclear-free world.
|
|
Air France flies non-stop to
Mexico by the shortest route, over the United States.
But at least twice last year, Air France Flight 438, from Paris to
Mexico City, was diverted from flying over the United States because one
of its passengers was on a U.S. government terrorism watchlist.
The U.S. Department of Homeland Security already diverts flights away
from U.S. air space for security reasons. But starting in December with
the introduction of Secure Flight, the latest U.S anti-terrorism
measure, passengers from all over the world - including Canada - whose
views raise a flag with U.S. authorities or who share the name of
someone on a U.S. watchlist could be barred from boarding flights that
fly over the United States.
|
|
Signaling a new offensive
mindset, international military officials vowed Friday to fight the
pirates as swarms of Somalis moved into the waters off East Africa. Four
shootouts with pirates showed that high-seas attacks are intensifying
with the end of the monsoon season.
Nearly half the 47 ships hijacked off Somalia last year were taken in
March and April — the most dangerous months of the year for ships in
the Gulf of Aden and Indian Ocean.
|
Cloud Security |
03/15/2010
|
|
At the RSA conference in San
Francisco, Trend Micro CTO Raimund Genes discusses the companys plans
for building private clouds within public clouds.
|
BotNet Masterminds Caught |
03/13/2010
|
|
Police believe the men were not
expert hackers and bought their virus program on the black market before
using it to take over other peoples computers in order to create a botnet,
a network of enslaved computers.
Fortunately this botnet of 13 million computers was controlled by
someone who had not realized how powerful it was, Juan Salon, the
head of the cybercrime unit of Spains Civil Guard Police, told a news
conference.
|
Security Worries are Hindering Cloud
Development |
03/12/2010
|
|
There is a definite buzz of
concern about cloud computing security as companies try to figure out
when, how and whether they're going to use public (as opposed to
private or internal) cloud services. Companies want to know that
cloud service providers will protect their information, and
service-level agreements and SaS 70 audits may not offer them enough
reassurance.
|
Scott Brown Focusses on Security
Committees |
03/11/2010
|
|
Sen. Scott Brown, who campaigned
on the idea of freezing federal worker salaries to control the deficit,
may soon get to explore the topic further.
Senate Republicans announced Tuesday that Brown will join the Homeland
Security and Governmental Affairs Committee, as well as the Armed
Services and Veterans Affairs committees.
|
|
The Army announced its first
internal applications-development challenge March 1. The program, called
Apps for the Army, or A4A, gives Army personnel the opportunity
to demonstrate their software-development skills.
Open to all Soldiers and Army civilians, the challenge's top submissions
will be recognized at the LandWarNet Conference in August. Winners will
receive monetary awards from a cash pool totaling $30,000.
|
|
New software could be used by
banks and e-commerce firms to secure customers online Web security firm
Network Intercept today announced the UK launch of its Secure-Me online
security and privacy solutions, promising faster browsing and increased
protection from identity theft.
|
|
A deal between internet giant
Google and the US National Security Agency on cyber-attacks may pose
serious threats to other countries national security and internet users.
Analysts worry the collaboration would allow Googles data to flow to the
spy agency.
|
Old Security Threat to New Smartphones |
03/07/2010
|
|
Rutgers University researchers
say they have identified an old computer security threat that can attack
new generations of smartphones.
The researchers, led by Professor Liviu Iftode and Assistant Professor
Vinod Ganapathy, said smartphones are essentially becoming regular
computers. They run the same class of operating systems as desktop and
laptop computers, so they are just as vulnerable to attack by malicious
software
|
Comcast Test Security |
03/06/2010
|
|
Comcast unveiled on Tuesday an
aggressive plan to deploy new DNS security mechanisms that are designed
to protect Web site operators and consumers from a specific type of
hacking attack that involves hijacking Web traffic and redirecting it to
bogus sites.
|
Congress to Do More to Secure Net |
03/05/2010
|
|
The US government must take a
more active role in securing the Internet, industry experts told
Congress yesterday, arguing that the prospect of a serious attack is
growing as businesses and governments rely more on cyberspace.
|
Europe Launches an Anti Trust Probe of
Google |
03/04/2010
|
|
Google is being investigated for
possible anticompetitive behavior in Europe following complaints filed
against it there by three competitors, Google revealed in a blog post
Tuesday.
The investigation, which has been described as preliminary, follows
complaints filed with the European Commission by a U.K. price comparison
site called Foundem, a French legal search engine called ejustice.fr,
and a German search site called Ciao that was recently acquired by
Microsoft, Google said.
|
Journalists or Spies in Iran |
03/03/2010
|
|
More than 65 journalists,
bloggers and writers have been detained in Iran since last Junes
disputed presidential polls and could be tried on charges of spying
for the foreign media, a New York-based media rights group said Tuesday
|
Software Industry Conference July 15-17,
2010 Dallas Texas |
03/02/2010
|
|
The Software Industry Conference
is a three day event, July 15-17, 2010 in Dallas, Texas with
educational sessions and networking events.
|
Chinese Schools Implicated in Cyber
Attacks |
03/01/2010
|
|
Two Chinese schools have been
linked to the cyber attacks on Google and dozens of other companies last
year.
Computers at Shanghai Jiaotong University and the Lanxiang Vocational
School in China reportedly played a role in the attacks, according to
unnamed sources cited in The New York Times.
Jim Christy, the Director of Futures Exploration at the Department of
Defense Cyber Crime Center, talks about the increasing sophistication of
attacks that he is starting to see.Lanxiang Vocational School, The New
York Times says, was created with funding from the Chinese military and
trains computer scientists for the Chinese military. Its network is
operated by a company with ties to Baidu, Googles most significant rival
in China.
|
Current Blog
2010 Securty Blog Archive
March Archive
February Archive
January Archive
2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July
Archive
June
Archive
May
Archive
April
Archive
March Archive
February
Archive
January
Archive
2008 Security Blog Archive
December
Archive
November Archive
October
Archive
September
Archive
July-August
Archive
May-June
Archive
April
Archive
March Archive
February
Archive
January
Archive
2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June
Archive
May Archive
April Archive
March Archive
February Archive
January Archive
2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive
|