Массив актуальной информации. Самые свежие новости. Доступная лента событий. Первоисточники. Факты. Происшествия. Катастрофы. Конфликты. Скандалы.

Смотреть онлайн фильмы, слушать радио онлайн, хорошее качество - Cinema Snob

суббота, января 23, 2010

What Researchers Are Learning About DDoS Tactics; Microsoft confirms 17-year-old Windows bug


What Researchers Are Learning About DDoS Tactics
Two IT security specialists -- one with experience in dealing with DDoS attacks against government systems, the other a specialist from the corporate side -- share what they've learned about the targets chosen for DDoS attacks and how to adjust security strategies based on those lessons. (Second in a series) Read More


WHITE PAPER: WatchGuard

When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution. Click here.


WHITE PAPER: Juniper Networks

Advancing the Economics of Networking
Aging network systems and old habits have dictated how businesses spend their IT budgets. As a result, a large percentage, if not a majority, of IT dollars are being spent to merely "stay in the race" and keep pace with the competition. Juniper Networks® proposes to change this economic model. Find out how

Microsoft confirms 17-year-old Windows bug
Microsoft warns that a bug in the kernel of a 32-bit windows versions could allow hackers to hijack PCs. The company said the bug is 17-years old. Read More

Taken to the Cleaners
A study from Credant Technologies finds clothes dropped off at the dry cleaners are often filled with forgotten USB sticks. Read More

The Great PCI Security Debate of 2010: Transcribed
For those who prefer to read as well as listen, here's a partial transcript of the PCI security debate that appeared on CSO Senior Editor Bill Brenner's Security Insights podcast and Martin McKeay's Network Security podcast. Read More

Network World's Products of the Week slideshow
Our round-up of intriguing new products from F5, Crescendo, Citrix among others. Read More


WHITE PAPER: NetApp

Inefficiencies Behind Exchange, SQL Server, More
Discover four current Microsoft application infrastructure challenges and why recent changes in Microsoft infrastructures create a compelling opportunity to improve underlying storage infrastructures right now. Learn more!

Report: ISPs Fear Many More DDoS Attacks in 2010
Internet service providers are worried about increasingly sophisticated attacks on cloud-based services, according to new survey from Arbor Networks. Read More

Mobile router hack reveals user's location
A user of Novatel Wireless's MiFi 'portable Wi-Fi' hotspot appears to have stumbled on a security flaw that could allow an outsider to work out a user's location without their knowledge. Read More

Firefox, Opera downloads soar after IE warnings
Mozilla yesterday reported a "huge increase" in downloads of Firefox in Germany after that country's computer security agency urged IE users to dump the browser and run a rival instead. Read More

Clinton: US gov't will push harder against Web censorship
The U.S. Department of State will launch several new initiatives focused on fighting Internet censorship, including working with businesses and other groups to develop mobile applications that help residents of countries with repressive governments report problems, U.S. Secretary of State Hillary Clinton said Thursday. Read More


WHITE PAPER: Riverbed

Rapid Replication for Virtual Servers
What's the connection between virtualization and acceleration? It's deeper than you might think. See how these two hot technologies complement each other to consolidate servers, enhance DR and simplify the IT infrastructure. Learn more.

Identity theft on the rise
Identity theft has been a major and growing problem in the United States for several years. The Privacy Rights Clearinghouse, a "nonprofit consumer organization with a two-part mission -- consumer information and consumer advocacy" has an excellent survey page with pointers to years of published studies and point-form summaries of many of their findings. Read More

Google hack malware said to be Chinese in origin
One researcher examining a sample of the malware used to attack Google and others for espionage purposes says it clearly is Chinese in origin, citing technical attributes of the Trojan's cyclic redundancy check algorithm. Read More

Hackers wield newest IE exploit in drive-by attacks
A security researcher said hackers are attacking some PC users by using an Internet Explorer exploit allegedly used last month to break into Google's network. Read More

Smartphones need smart security practices
As vice president of IT at Windsor Foods in Houston, Stephan Henze has to stay one step ahead of the latest IT trends. That's why he's spending a lot of time thinking about securing and deploying smartphones enterprisewide. The company had only a few-dozen smartphones just a short time ago, but IT now manages about 100 of them, and Henze foresees substantial growth in the near future. Read More

Conficker worm hasn't gone away, Akamai says
Variants of the Conficker worm were still active and spreading during the third quarter, accounting for much of attack traffic on the Internet, according to Akamai Technologies. Read More



Комментариев нет:

Отправить комментарий

Прокомментируйте сообщение