Computer Security
Security
|
Written by Daniel
|
Wednesday, 03 September 2008 11:30 |
Chrome suffers first security flaw September 3, 2008 7:29 AM PDT posted by Robert Vamos C/Net news On Wednesday, researchers announced a flaw in how the Google Chrome browser behaves with undefined handlers. An exploit provided as a demonstration crashes the new browser.
In an article on the Securiteam site, Rishi Narang from Evilfingers says a crash can occur without user interaction. If a user is provided a malicious link with an undefined handler followed by a special character, Chrome crashes. [Comments...] |
|
Security
|
Written by Daniel
|
Monday, 25 August 2008 11:47 |
Security Researcher Warns of Vista Vulnerabilities Ulrika Hedquist, Computerworld New Zealand Online Monday, August 25, 2008 7:28 AM PDT
A New Zealand security researcher is exploring several scenarios in which Windows Vista could be attacked and warns more protection is needed for users. Ben Hawkes presented his findings at the Black Hat conference, held in Las Vegas this month, and will also present them at the Kiwicon conference, to be held in Wellington in the end of September. |
Read more...
|
Security
|
Written by Daniel
|
Friday, 04 July 2008 12:44 |
Cloud computing is picking up traction with businesses, but before you jump into the cloud, you should know the unique security risks it entails
By Jon Brodkin, Network World July 02, 2008 InfoWorld Cloud computing is fraught with security risks, according to analyst firm Gartner. Smart customers will ask tough questions and consider getting a security assessment from a neutral third party before committing to a cloud vendor, Gartner says in a June report titled "Assessing the Security Risks of Cloud Computing. "Cloud computing has "unique attributes that require risk assessment in areas such as data integrity, recovery, and privacy, and an evaluation of legal issues in areas such as e-discovery, regulatory compliance, and auditing," Gartner says. [Comments..] |
Security
|
Written by Danrok
|
Wednesday, 02 July 2008 09:49 |
Supposedly no one knows how they did itFrom The Inquirer: NOW WE KNOW WHY early this year - in the midst of the banking liquidity crisis caused by mounting downgrades of toxic over-leveraged debt based on souring subprime mortgage loans - Citibank abruptly cut its daily limit on ATM withdrawal amounts in half. |
Read more...
|
Security
|
Written by Daniel
|
Monday, 09 June 2008 10:59 |
How safe is instant messaging? A security and privacy survey Declan McCullagh
The number of interested parties eager to listen in on your online conversations, including what you type through instant messaging, has never been higher. It's trivial to monitor unencrypted wireless networks and snatch IM passwords as they flow through the ether. Broadband providers and their business partners are enthusiastically peeking into their customers' conversations. A bipartisan majority in Congress has handed the FBI and shadowy government agencies greater surveillance authority than ever before. |
Read more...
|
Security
|
Written by Daniel
|
Wednesday, 09 April 2008 13:30 |
Microsoft security maturing fast With release of its Stirling security management platform, company officials and industry watchers say Microsoft is proving itself a force to be reckoned with in the sector
By Matt Hines April 08, 2008 InfoWorld
One year ago, Microsoft was defending the quality of its products, battling with the world's largest security vendors over features in its next-generation platforms, and pitching the company's nascent promise as a provider of IT systems-defense tools at the annual RSA conference.
With the release of its Stirling security management platform at the ongoing RSA Conference 2008 in San Francisco on Tuesday, company officials and industry watchers contend that the software giant is rapidly proving itself a force to be reckoned with in the sector. [Comments...] |
Security
|
Written by Daniel
|
Wednesday, 26 March 2008 12:47 |
Featured whitepapers: Open Source Security Myths, and more
By Ryan Paul | Published: March 26, 2008 - 10:45AM CT ARS Technica Many players in the tech industry publish topical whitepapers that include analysis and commentary on a wide range of issues that are relevant to technologists and IT overlords alike. We read a bunch of these ourselves, and this week we have a few we'd like to share. |
Read more...
|
Security
|
Written by Daniel
|
Saturday, 15 March 2008 11:52 |
Google adds a new layer of security to Google Apps By Joel Hruska | Published: March 14, 2008 - 01:01PM CT ARS Technica Google Apps is getting a new layer of security aimed at IT departments worried about phishing attacks and care less users. Google and Arcot Systems announced a partnership that makes Arcot's A-OK On-Demand authentication system available to any Google Apps Premier Edition customer for just $1 a month. By partnering with Arcot and offering the service at such a minimal fee, Google is aiming to further entice business customers and enhance the reputation of Google Apps as a secure, business-ready system. [Comments...] |
Security
|
Written by Daniel
|
Thursday, 13 March 2008 12:02 |
Virtualization can be both a blessing and a curse, serving up improved security while at the same time hiding dangers
By Galen Gruman March 13, 2008 InfoWorld
Almost any IT department worth its salt is deploying virtualization technology today to reduce power usage, make server and OS deployments more flexible, and better use storage and systems resources. But as virtualization technology gains in popularity, it may bring with it new risks, said Don Simard, the commercial solutions director at the U.S. National Security Agency, the electronic intelligence and cryptographic agency once so secret its very existence was a secret. At the same time, virtualization technology may bring new protections, he noted. [Comments...] |
Security
|
Written by Daniel
|
Thursday, 28 February 2008 13:51 |
Security glitch exposes OS X account passwords Posted by Declan McCullagh, February 28, 2008 10:00 AM PST C/Net News
Apple has confirmed a security glitch that, in many situations, will let someone with physical access to a Macintosh computer gain access to the password of the active user account.
The vulnerability arises out of a programming error that stores the account password in the computer's memory long after it's needed, meaning it can be retrieved and used to log into the computer and impersonate the user. |
Read more...
|
|
|
<< Start < Prev 21 22 23 24 25 26 27 28 Next > End >>
|
Page 26 of 28 |
|
|