Computer Security
Security
|
Written by Daniel
|
Wednesday, 20 May 2009 11:57 |
A vulnerability in the Java virtual machine, which can allow arbitrary code execution, was publicly disclosed and fixed by Sun last December. However, security experts warn that the JVM in Mac OS X still remains un-patched against the vulnerability. By Chris Foresman | Last updated May 20, 2009 11:05 AM CT Mac OS X contains a serious security vulnerability in its implementation of Java, according to several security experts. The vulnerability remains in the software even after Sun had disclosed and patched the problem and Apple had been notified of the issue by at least one security researcher. A vulnerability related to de-serializing certain Java objects can result in arbitrary code running outside of the JVM's sandbox with the same privileges as the current user. It was reported to Sun in August 2008, and in December 2008, Sun disclosed the vulnerability and issued a patch. Despite recent security updates from Apple, researches say this "critical" vulnerability still exists in Mac OS X. [ARS Technica...] [Comments...] |
|
Security
|
Written by Daniel
|
Tuesday, 19 May 2009 11:35 |
IDC "Digital Universe" study says volume of data is vastly outgrowing the resources available to protect it May 18, 2009 | 03:12 PM By Tim Wilson DarkReading The good news is that there will be plenty of job openings for security pros in the digital universe of the coming years, according to a report published today. The bad news is that those security pros are going to have their work cut out for them. According to the annual "Digital Universe" report published by International Data Corp. (IDC), the volume of data created by individuals and businesses continues to multiply, doubling every 18 months. At its current rate, the universe of content created across the globe will grow fivefold " from 486 exabytes to more than 2,500 exabytes " by the end of 2012. [Comments...] |
Security
|
Written by Daniel
|
Friday, 15 May 2009 11:29 |
Dying storage dot-coms can make precious images or business data vanish overnight. Here's how to protect yourself. Tom Spring, PC World May 14, 2009 6:00 pm
Online storage sites, the toast of the Internet circa 2006, are shutting down in droves, putting the data and images of their users in jeopardy. Online storage services that have announced closings in the past ten months include big names in tech: AOL (Xdrive and AOL Pictures), Hewlett-Packard (Upline), Sony (Image Station), and Yahoo (Briefcase). Plenty of lesser-known online storage firms also have kicked the bucket, including Digital Railroad and Streamload MediaMax, which turned into The Linkup. Using these sites used to be a no-brainer--you just uploaded your summer-vacation pictures or your business files and then shared or used them anytime you wished. Now you have to wonder: Will my information still be around tomorrow? [Comments...] |
Security
|
Written by Daniel
|
Thursday, 14 May 2009 11:30 |
At its peak, the Trojan-infested counterfeit version of Microsoft's prerelease version of Windows 7 was infecting more than 200 PCs an hour May 12, 2009 | 03:36 PM By Kelly Jackson Higgins DarkReading A pirated version of the new Windows 7 operating system release candidate that has been circulating around the Internet is also building out a botnet. The rogue OS, which is rigged with a Trojan downloader, at one point had around 27,000 bots in its control as of May 10, when researchers took over the command and control (C&C) server that communicated with the bots and served them additional malware. At the height of the botnet buildup, the botmaster was recruiting more than 200 machines an hour, says Tripp Cox, vice president of engineering for Damballa. [Comments...] |
Security
|
Written by Daniel
|
Wednesday, 13 May 2009 11:27 |
The UK government is finalizing its approach to dealing with online copyright infringement. Internet disconnections have been publicly taken off the table, but UK creative industries are now lobbying hard for disconnection as the report nears completion. ISPs argue that better licensing and business models would do a better job of solving the problem. By Nate Anderson | Last updated May 12, 2009 2:31 PM CT [ARS Technica... ] [Comments...] |
Security
|
Written by Daniel
|
Tuesday, 14 April 2009 11:56 |
Researcher details attacks on intranets that abuse Internet Explorer 7 and 8 security default settings
Apr 13, 2009 | 02:54 PM By Kelly Jackson Higgins DarkReading
Internet Explorer 7 and 8's default security settings can be unsafe for internal, intranet-based Web applications, according to newly published research.
Cesar Cerrudo, founder and CEO of Argennis, a security consulting firm in Argentina, has demonstrated that IE's default features for intranet "zones" can be abused to wage attacks on internal Web applications both from the outside and from within the organization. Cerrudo has released his findings, which show how default settings can be used both to detect and exploit vulnerabilities in intranet applications. [Comments... ] |
Security
|
Written by Daniel
|
Tuesday, 07 April 2009 11:55 |
New virtualization security firm HyTrust partners with VMWare, Citrix, Cisco, and Symantec
Apr 06, 2009 | 08:07 AM By Kelly Jackson Higgins A new security startup launched today with an appliance that helps fill a gap that thus far has dogged the widespread adoption and implementation of virtualization -- the need for an automated, unified way to manage and secure the virtual infrastructure and ensure compliance. |
Read more...
|
Security
|
Written by Daniel
|
Monday, 06 April 2009 12:12 |
A new bill would create a "cybersecurity czar" who would oversee the government's computer security programs. More controversially, the czar would have power over some private networks if they are considered to be "critical infrastructure." By Julian Sanchez | Last updated April 6, 2009 8:00 AM CT With President Obama's 60-day comprehensive review of US cybersecurity still underway, Sens. Jay Rockefeller (D-WV) and Olympia Snowe (R-ME) on Wednesday introduced sweeping legislation that would establish a cybersecurity "czar" within the White House and bring both governmental and private sector "critical infrastructure" under a unified regulatory regime. [ArsTechnica...] [Comments...] |
Security
|
Written by Daniel
|
Tuesday, 31 March 2009 11:33 |
The agency's US-CERT team created worm-scanning software for federal and state government agencies, commercial vendors, and critical infrastructure owners.
By Thomas Claburn InformationWeek March 30, 2009 07:45 PM
As computer security firms play down the risk posed by the Conficker/Downadup worm, the Department of Homeland Security on Monday released a DHS-developed detection tool to help organizations scan for computers infected by the worm.
The DHS US-CERT team created worm-scanning software for federal and state government agencies, commercial vendors, and critical infrastructure owners. It's being made available through the Government Forum of Incident Response and Security Teams Portal and to private-sector partners through various Information Sharing and Analysis Centers. [Comments...] |
Security
|
Written by Daniel
|
Friday, 13 March 2009 12:28 |
Security industry leaders agree that White House should lead revamped cybersecurity effort
Mar 10, 2009 | 06:17 PM By Tim Wilson DarkReading
Some of the nation's top cybersecurity experts today told a congressional subcommittee that the United States isn't ready for a major online attack, and called on the White House and the rest of the federal government to get their acts together.
In a hearing held by the House Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology, four top IT security officials expressed concern about the government's slow movement in developing a defense for its own agencies and for the nation's critical infrastructure. All four said the White House should lead the effort with the creation of a civilian agency dedicated to cyberdefense. [Comments...] |
|
|
<< Start < Prev 21 22 23 24 25 26 27 28 Next > End >>
|
Page 24 of 28 |
|
|