• Critical zero-day vulnerability found in Adobe Flash, Reader, Acrobat

    Updated: 2010-10-28 15:59:55
    Adobe Flash, Reader and Acrobat are vulnerable to security holes that could allow malicious hackers to take control over your computer. Read more…

  • Keep it simple…

    Updated: 2010-10-28 15:23:44
    The real problem is one of philosophy. IPv6 tries to do too many things, to provide too many features. This doesn’t, as a general rule, work out well. The tools which stand the test of time aren’t intelligent, feature-rich toys. They’re simple, streamlined creatures which do one thing Very Well.

  • Welcome to Naked Security!

    Updated: 2010-10-28 08:20:35
    Tell us what you think about the new look of our site - good or bad - by leaving a comment. Yes, we have comments on our blog now. Who'd have thought it? Read more…

  • Firefox hit by critical zero-day vulnerability

    Updated: 2010-10-27 09:50:47
    Mozilla has issued a warning that its popular Firefox browser contains a critical vulnerability that is being actively exploited by cybercriminals to distribute malware. Read more…

  • Firesheep: SideJacking Made Painfully Simple

    Updated: 2010-10-26 15:58:46
    The big news of the week, emanating from Toorcon 12, is the release of Firesheep. This tool makes SideJacking – that is, “hijacking an engaged Web session with a remote service by intercepting and using the credentials that identified the user/victim to that specific server” – painfully simple for anybody to use. How easy? Well, [...]

  • Firesheep

    Updated: 2010-10-26 02:02:46
    Public wireless locations just got a bit more dangerous.   It has never really been ok to use open unencrypted wireless connections such as at the Library or Panera Bread.   Unencrypted wireless connections can be snooped on by anyone within range of the wireless.   Encrypted connections aren’t much more trustworthy.   While an ISP or a company might have controls [...]

  • arp spoofing Google Scholar

    Updated: 2010-10-25 19:10:23
    Web Images Videos Maps News Shopping Gmail more Scholar Preferences Settings Sign in Advanced Scholar Search Scholar Articles and patents Articles excluding patents Legal opinions and journals Federal cases California cases Advanced search include citations at least summaries Create email alert Results 1 10 of about 24 0.11 sec The Security Defect of Switcher and Network with Improvement Method J X Chunshan , H Xinhan , W Min COMPUTER ENGINEERING , 2000 en.cnki.com.cn The security defect of ARP is discussed in detail in this paper . The ARP spoofing can break the communication between two hosts or can makes the communication between two hosts to past to the attacker . Switcher disables Cited by 6 Related articles Cached CITATION An introduction to ARP spoofing white paper S Whalen 1998

  • Computer Misuse Act 1990 Wikipedia the free encyclopedia

    Updated: 2010-10-25 19:10:23
    , Computer Misuse Act 1990 From Wikipedia , the free encyclopedia Jump to : navigation search This article needs additional citations for verification Please help improve this article by adding reliable references Unsourced material may be challenged and removed January 2009 Computer Misuse Act 1990 United Kingdom Parliament Long title An Act to make provision for securing computer material against unauthorised access or modification and for connected . purposes Statute book : chapter 1990 c . 18 Introduced : by Michael Colvin Territorial : extent England and Wales Scotland Northern Ireland Dates Date of Royal Assent 29 June 1990 : Commencement 29 August 1990 Other legislation : Amendments Criminal Justice and Public Order Act 1994 Criminal Justice Terrorism and Conspiracy Act 1998 Status

  • Google investigated over household data privacy breaches Technology The Guardian

    Updated: 2010-10-25 01:50:38
    Turn autoplay off Turn autoplay on Please activate cookies in order to turn autoplay off Jump to content s Jump to site navigation 0 Jump to search 4 Terms and conditions 8 Mobile site Sign in Register Text larger smaller About us About us Contact us Press office Guardian Print Centre Guardian readers' editor Observer readers' editor Terms of service Privacy policy Advertising guide Digital archive Digital edition Guardian Weekly Buy Guardian and Observer photos Subscribe Today's paper The Guardian G2 features Comment and debate Editorials , letters and corrections Obituaries Other lives Sport MediaGuardian Subscribe Zeitgeist Today's hot topics guardian.co.uk Technology Web News Sport Comment Culture Business Money Life style Travel Environment TV Video Community Blogs Jobs News

  • GuardianEdge Removable Storage Encryption

    Updated: 2010-10-23 22:21:29
    The encryption of mobile devices has been recommended to management for a while now.   After it came up again in a recent HIPPA audit, money became available in FY11. As an administrator of GuardianEdge Hard Disk encryption (GEHD), it was natural to consider them for encrypting USB devices.  GuardianEdge Removable Storage Encryption requires the GuardianEdge [...]

  • Be Smarter than John

    Updated: 2010-10-21 14:49:36
    Hilarious video from F-Secure.  I’ve got people emailing their credit card numbers clear text.   Perhaps this might get the message across.

  • SANS DC December 2010

    Updated: 2010-10-20 15:46:05
    SANS Cyber Defense Initiative is December 10-17th at the Wardman Park Marriott.   I’ve been down to this hotel for conferences a lot.   Good facilities.   It’s decent to get to on metro from Virginia.   Not one of my favorite rides, but its good central location for the area.   There are a lot of courses available for a full list [...]

  • October 2010 Blog Central

    Updated: 2010-10-20 12:41:41
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive October 2010 27 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 193 Corporate 173 Enterprise 281 McAfee Labs 1009 Tags Acquisition Channel Partners Compliance Consumer Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Endpoint Protection facebook Family Safety government identity protection malware McAfee Network Security Operation Aurora PCI phishing Public Sector Risk and Compliance security

  • September 2010 Blog Central

    Updated: 2010-10-20 12:41:40
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive October 2010 27 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 193 Corporate 173 Enterprise 281 McAfee Labs 1009 Tags Acquisition Channel Partners Compliance Consumer Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Endpoint Protection facebook Family Safety government identity protection malware McAfee Network Security Operation Aurora PCI phishing Public Sector Risk and Compliance security

  • August 2010 Blog Central

    Updated: 2010-10-20 12:41:40
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive October 2010 27 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 193 Corporate 173 Enterprise 281 McAfee Labs 1009 Tags Acquisition Channel Partners Compliance Consumer Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Endpoint Protection facebook Family Safety government identity protection malware McAfee Network Security Operation Aurora PCI phishing Public Sector Risk and Compliance security

  • July 2010 Blog Central

    Updated: 2010-10-20 12:41:40
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive October 2010 27 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 193 Corporate 173 Enterprise 281 McAfee Labs 1009 Tags Acquisition Channel Partners Compliance Consumer Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Endpoint Protection facebook Family Safety government identity protection malware McAfee Network Security Operation Aurora PCI phishing Public Sector Risk and Compliance security

  • June 2010 Blog Central

    Updated: 2010-10-20 12:41:39
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive October 2010 27 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 193 Corporate 173 Enterprise 281 McAfee Labs 1009 Tags Acquisition Channel Partners Compliance Consumer Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Endpoint Protection facebook Family Safety government identity protection malware McAfee Network Security Operation Aurora PCI phishing Public Sector Risk and Compliance security

  • May 2010 Blog Central

    Updated: 2010-10-20 12:41:39
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive October 2010 27 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 193 Corporate 173 Enterprise 281 McAfee Labs 1009 Tags Acquisition Channel Partners Compliance Consumer Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Endpoint Protection facebook Family Safety government identity protection malware McAfee Network Security Operation Aurora PCI phishing Public Sector Risk and Compliance security

  • April 2010 Blog Central

    Updated: 2010-10-20 12:41:38
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive October 2010 27 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 193 Corporate 173 Enterprise 281 McAfee Labs 1009 Tags Acquisition Channel Partners Compliance Consumer Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Endpoint Protection facebook Family Safety government identity protection malware McAfee Network Security Operation Aurora PCI phishing Public Sector Risk and Compliance security

  • March 2010 Blog Central

    Updated: 2010-10-20 12:41:38
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive October 2010 27 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 193 Corporate 173 Enterprise 281 McAfee Labs 1009 Tags Acquisition Channel Partners Compliance Consumer Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Endpoint Protection facebook Family Safety government identity protection malware McAfee Network Security Operation Aurora PCI phishing Public Sector Risk and Compliance security

  • February 2010 Blog Central

    Updated: 2010-10-20 12:41:38
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive October 2010 27 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 193 Corporate 173 Enterprise 281 McAfee Labs 1009 Tags Acquisition Channel Partners Compliance Consumer Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Endpoint Protection facebook Family Safety government identity protection malware McAfee Network Security Operation Aurora PCI phishing Public Sector Risk and Compliance security

  • January 2010 Blog Central

    Updated: 2010-10-20 12:41:37
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive October 2010 27 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 193 Corporate 173 Enterprise 281 McAfee Labs 1009 Tags Acquisition Channel Partners Compliance Consumer Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Endpoint Protection facebook Family Safety government identity protection malware McAfee Network Security Operation Aurora PCI phishing Public Sector Risk and Compliance security

  • 2009 Blog Central

    Updated: 2010-10-20 12:41:37
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive October 2010 27 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 193 Corporate 173 Enterprise 281 McAfee Labs 1009 Tags Acquisition Channel Partners Compliance Consumer Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Endpoint Protection facebook Family Safety government identity protection malware McAfee Network Security Operation Aurora PCI phishing Public Sector Risk and Compliance security

  • 2008 Blog Central

    Updated: 2010-10-20 12:41:36
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive October 2010 27 September 2010 40 August 2010 47 July 2010 34 June 2010 42 May 2010 31 April 2010 32 March 2010 36 February 2010 47 January 2010 34 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 193 Corporate 173 Enterprise 281 McAfee Labs 1009 Tags Acquisition Channel Partners Compliance Consumer Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Endpoint Protection facebook Family Safety government identity protection malware McAfee Network Security Operation Aurora PCI phishing Public Sector Risk and Compliance security

  • Kingsoft Office 2010 Review in Computer Shopper

    Updated: 2010-10-20 01:32:34
    Kingsoft Office 2010 Review in Computer Shopper

  • Pen-Testing is boring – logging requirements

    Updated: 2010-10-19 11:10:25
    Pen-testing as a job is quite boring compared to learning it or doing it for fun. Why is that? You have to be meticulous about logging every packet that goes between your machine and your client’s. You have to keep logs of everything you’ve tried and what worked and what didn’t. So, when the client [...]

  • MAAS360 eval

    Updated: 2010-10-18 04:17:28
    Last month, I mentioned that was doing an eval of MAAS360.   This month I”m providing a postscript on that. MAAS360 is a software/security as a service product from Fiberlink.   In its basic ‘visibility’ mode, it provides hardware /software inventory, patch management, antivirus/firewall reporting, Windows 7 readiness reports, encryption reports and information on VPN and other [...]

  • One-time Passwords (OTPs)

    Updated: 2010-10-16 04:40:55
    Facebook recently introduced some interesting functionality that’s being touted as an “opt-in security feature.” When I first heard that they were incorporating one-time passwords (OTP), I figured it was probably a pretty good idea. In theory, OTP seems straightforward to implement, and can offer some substantial benefits when done correctly. However, after learning how Facebook [...]

  • BlueCoat ProxyClient 3.2.2.4

    Updated: 2010-10-13 19:23:08
    I was doing some testing with BlueCoat ProxyClient 3.2.2.3 and was seeing weird things. ProxyClient is software installed on laptops so when the client is outside the corporation it will still do URL filtering with WebPulse.    I’ve written about it before and it seems like a nice middle ground between no protection and having to [...]

  • McAfee Labs Blog Central

    Updated: 2010-10-12 16:06:04
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Meet the Bloggers Abhishek Karnik Adam Pridgen Adam Wosotowsky Aditya Kapoor Ahmed Sallam Alex Hinchliffe Alex Thurber Allysa Myers Andrew Berkuta Anil Ramabhatta Anna Stepanov Apurv Anand Arun Pradeep Ashley Wearne Avelino Rico Jr Barry McPherson Ben Edelman Bhaskar Krishna Bing Sun Brad Antoniewicz Brant Yaeger Brian Contos Brian Foster Brian Kenyon Brian Mann Carrie Ellis Cedric Cochin Charles Ross Chen Yu Chintan Shah Chris Barton Consumer Threat Alerts Craig Schmugar Dan Sommer Dan Wolff Dave Klenske David DeWalt David Hatchell David Marcus David Rayhawk

  • Blog Central

    Updated: 2010-10-12 16:06:04
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Blog Central Welcome to McAfee Blog Central , the McAfee hub in the blogosphere Here you will find opinion , information and other blogs from around McAfee Learn more Featured Blog CEO Perspectives Follow CEO David DeWalt as he reports , reviews , and reflects on the latest news and developments in the security View more Corporate Featured : Blog CEO Perspectives Follow CEO David DeWalt as he reports , reviews , and reflects on the latest news and developments in the security View more Other Corporate blogs CEO Perspectives Corporate Responsibility CTO McAfee Channel Partner Recent Corporate posts Stop , Think , Connect Welcome to Cybersecurity Awareness Month Web 2.0 Technologies Can Be Used

  • McAfee Labs Blog Central

    Updated: 2010-10-12 16:05:56
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Meet the Bloggers Abhishek Karnik Adam Pridgen Adam Wosotowsky Aditya Kapoor Ahmed Sallam Alex Hinchliffe Alex Thurber Allysa Myers Andrew Berkuta Anil Ramabhatta Anna Stepanov Apurv Anand Arun Pradeep Ashley Wearne Avelino Rico Jr Barry McPherson Ben Edelman Bhaskar Krishna Bing Sun Brad Antoniewicz Brant Yaeger Brian Contos Brian Foster Brian Kenyon Brian Mann Carrie Ellis Cedric Cochin Charles Ross Chen Yu Chintan Shah Chris Barton Consumer Threat Alerts Craig Schmugar Dan Sommer Dan Wolff Dave Klenske David DeWalt David Hatchell David Marcus David Rayhawk

  • Consumer Feeds Blog Central

    Updated: 2010-10-12 16:05:56
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Meet the Bloggers Abhishek Karnik Adam Pridgen Adam Wosotowsky Aditya Kapoor Ahmed Sallam Alex Hinchliffe Alex Thurber Allysa Myers Andrew Berkuta Anil Ramabhatta Anna Stepanov Apurv Anand Arun Pradeep Ashley Wearne Avelino Rico Jr Barry McPherson Ben Edelman Bhaskar Krishna Bing Sun Brad Antoniewicz Brant Yaeger Brian Contos Brian Foster Brian Kenyon Brian Mann Carrie Ellis Cedric Cochin Charles Ross Chen Yu Chintan Shah Chris Barton Consumer Threat Alerts Craig Schmugar Dan Sommer Dan Wolff Dave Klenske David DeWalt David Hatchell David Marcus David Rayhawk

  • Corporate Feeds Blog Central

    Updated: 2010-10-12 16:05:55
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Meet the Bloggers Abhishek Karnik Adam Pridgen Adam Wosotowsky Aditya Kapoor Ahmed Sallam Alex Hinchliffe Alex Thurber Allysa Myers Andrew Berkuta Anil Ramabhatta Anna Stepanov Apurv Anand Arun Pradeep Ashley Wearne Avelino Rico Jr Barry McPherson Ben Edelman Bhaskar Krishna Bing Sun Brad Antoniewicz Brant Yaeger Brian Contos Brian Foster Brian Kenyon Brian Mann Carrie Ellis Cedric Cochin Charles Ross Chen Yu Chintan Shah Chris Barton Consumer Threat Alerts Craig Schmugar Dan Sommer Dan Wolff Dave Klenske David DeWalt David Hatchell David Marcus David Rayhawk

  • Enterprise Feeds Blog Central

    Updated: 2010-10-12 16:05:53
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Meet the Bloggers Abhishek Karnik Adam Pridgen Adam Wosotowsky Aditya Kapoor Ahmed Sallam Alex Hinchliffe Alex Thurber Allysa Myers Andrew Berkuta Anil Ramabhatta Anna Stepanov Apurv Anand Arun Pradeep Ashley Wearne Avelino Rico Jr Barry McPherson Ben Edelman Bhaskar Krishna Bing Sun Brad Antoniewicz Brant Yaeger Brian Contos Brian Foster Brian Kenyon Brian Mann Carrie Ellis Cedric Cochin Charles Ross Chen Yu Chintan Shah Chris Barton Consumer Threat Alerts Craig Schmugar Dan Sommer Dan Wolff Dave Klenske David DeWalt David Hatchell David Marcus David Rayhawk

  • McAfee® 2 Minute Warning

    Updated: 2010-10-12 16:05:50
    Automated remediation Navigation Content Sidebar Footer Navigation Utility Navigation Search this Global Sites América Latina Español Australia English Brasil Português Canada English Canada Français China 中国 Simplified Chinese Danmark Dansk Deutschland Deutsch España- Español France Français Hong Kong English Italia Italiano Japan 日本 Japanese Korea 한국 Korean México Español Nederland Nederlands Norge Norsk Polska Polski Portugal Portuguese Sverige Svensk Singapore English Taiwan 台灣 Traditional Chinese United Kingdom English United States English Segment Navigation Home Home Office Small Medium Business Enterprise Partners Section Navigation Products Solutions Professional Services Support Downloads Security Insights Page Navigation Listen to Current Broadcast Archives McAfee SiteAdvisor

  • Employable

    Updated: 2010-10-11 17:38:31
    The AP reports, the unemployed are having a hard time finding work because in many cases the requirements are higher than ever.  People find themselves unqualified for even their old jobs.   Certifications that didn’t even exist when they started their career are now required to hold down the job.   I can see requiring  new employees [...]

  • Software Security Training on the Cheap

    Updated: 2010-10-11 15:19:42
    OWASP’s AppSecDC 2010 is less than a month away, running at the Washington Convention Center November 8-11. The first two days provide attendees and locals with an excellent opportunity to attend high-quality training for very little money. In particular, Gemini Security will be delivering KRvW Associates‘ “Software Security Best Practices” curriculum. This course is a [...]

  • Kingsoft Office 2010: An best alternative to Microsoft Office 2003/2007

    Updated: 2010-10-10 03:41:04
    Kingsoft Office 2010: An best alternative to Microsoft Office 2003/2007

  • Adobe Reader and Acrobat Security Updates

    Updated: 2010-10-06 05:29:22
    As previously announced by Adobe, today they released critical security updates for Adobe Reader and Acrobat. The Adobe Reader 9.4 update is a full install.   That is both a blessing and a curse.   Its good because I wont have one patch to upgrade people from the previous version, yet still have to build a full [...]

Current Feed Items | Previous Months Items

Sep 2010 | Aug 2010 | Jul 2010 | Jun 2010 | May 2010 | Apr 2010