• Firefox 4 gets its first security update

    Updated: 2011-04-30 04:06:38
    Five weeks after shipping Firefox 4, the Mozilla project has published the new browser's first-ever security update. The Firefox version number bumps up to 4.0.1. Read more…

  • More Data Loss, Eh?

    Updated: 2011-04-29 19:55:46
    Comptroller Susan Combs offered another apology Thursday for the information breach in her agency, saying she now is offering a year of free credit monitoring to the 3.5 million people at risk of identity theft after their data was exposed on a public computer server…She announced in a written statement April 11 that the Social [...]

  • The New York Yankees and DSLReports.com responsible for 30,000 more data loss victims

    Updated: 2011-04-29 06:44:35
    The New York Yankees accidentally emailed personal details on 21,000 customers to their affiliates. Around the same time DSLReports disclosed they had been hacked through a SQL injection attack that disclosed the plain text passwords of thousands of members. Read more…

  • Data thefts far more common than just Sony and Epsilon

    Updated: 2011-04-28 20:27:49
    While we are all interested when millions of records are stolen from well known companies, these attacks are a small part of the problem. Read more…

  • PSN break in

    Updated: 2011-04-28 14:24:00
    If you haven’t heard already about the PlayStation Network compromise, you should pay attention if you have a PS3 and use PSN. Your PSN online ID, name, address and birthdate have all been compromised, and (potentially) your secret questions, and credit card numbers. What I don’t understand is why Sony can’t definitively tell us that [...]

  • Sony says credit card details *were* encrypted, but questions still remain

    Updated: 2011-04-28 12:56:04
    Sony confirms that credit card details which could have been stolen in the recent hack of the PlayStation Network were encrypted, but doesn't reassure customers regarding the strength of encryption. Read more…

  • Free anti-virus for Mac named Best Anti-Malware solution at SC Awards

    Updated: 2011-04-28 12:20:34
    Who would have thought it? A free anti-virus program for Apple Macs being named best anti-malware solution ahead of those security products for boring old Windows. Read more…

  • XSS: More Than Just Alert Boxes

    Updated: 2011-04-26 21:50:43
    Cross-site scripting (XSS) vulnerabilities allow an attacker to inject content in an otherwise trusted web page. XSS attacks in the wild typically try to execute JavaScript, and consequently XSS issues are typically demonstrated with a script function that’s short, simple, and visual: the alert box. Many XSS examples use alert(1) or alert(‘XSS’) as a payload. [...]

  • Saving paper Way when printing in Kingsoft Office 2010(2)

    Updated: 2011-04-26 10:00:53
    26th, March, 2011 from KSOffice Team Many times, we print some articles for reading, because you can not plug into a computer all day long in the pocket; sometimes we make changes to print some document, as thinking to use color-coded signs on the computer is not an easy operation … … there is always something [...]

  • Biometric-Security Data Storage Drive

    Updated: 2011-04-26 03:54:56
    The 4GB Fingerprint Secure USB Drive is one of the safest ways to store your confidential personal documents and high-sensitive business files. Simple scan and store your thumb to gain access to your files and folders- use this reliable, convenient and cost-saving secure storage USB to avoid personal identity and information theft.

  • Secret Clothes Hook Video Recorder

    Updated: 2011-04-26 03:54:53
    Ordinary Clothes Hook is Actually a Hidden Camera Secretly Recording Their Every Move The Clothes Hook Hidden Camera and video recorder, lets you keep track of what's going on in your home or office without raising any unnecessary eyebrows. A built-in pinhol

  • "Plug" &Play: AC Adapter Hidden Camera

    Updated: 2011-04-26 03:54:51
    It looks like a normal AC adapter plugged into your wall, but this device is the only plug & play surveillance system designed to capture footage completely covertly. The DIY system lets you save all footage onto a SD card for easy viewing and transfer.

  • Covert Button Camera with Recording (DVR)

    Updated: 2011-04-26 03:54:50
    An easy to use but pro quality button and screw camera, comes complete with an included DVR and multiple buttons and screws to fit with any outfit or wall fixtures. The original in body worn surveillance, no one will suspect that you're monitoring their every move.

  • New AVL GPS Tracker

    Updated: 2011-04-26 03:54:49
    Real-Time HardWired GPS Tracking us the perfect solution to manage your entire fleet. Bolt AVL GPS Tracker lets you centrally monitor your entire fleet from any computer.

  • Hidden Book Camera USB

    Updated: 2011-04-26 03:54:48
    The Hidden Book Camera USB delivers crystal clear color video. Keep an on your nanny, employee, contractor, or any other person working in your home or office. Wireless video-steaming has never been easier- with remote view, you can view video anytime, anywhere.

  • Hidden Book Color Wireless Camera (with RCA Receiver)

    Updated: 2011-04-26 03:54:47
    Now with all-wireless transmissions, signal interference has become a thing of the past! In addition to providing a crystal-clear video image, the Hidden Book Camera RCA features 100% secure transmission, so that no one can pick up your personal video footage.

  • HD Touch Screen Handheld DVR

    Updated: 2011-04-26 03:54:46
    One beautiful 2.6" crystal-clear screen, one-touch recording. The all-new HD Touchscreen DVR features a convenient-touch screen for sliding effortlessly through all of your photos and HD videos. Lightweight and portable with high-definition video clarity and multiple lens attachments, the HD Touchscreen DVR and HD Pinhole Camera make the ultimate secret surveillance recording system.

  • Clear Glasses Video Camera

    Updated: 2011-04-26 03:54:45
    Capture high-quality digital video with the Clear Glasses Video Camera. This hands-free camera easily connects to a video recorder, allowing you to effortlessly playback and review video footage.

  • Video Recording Sunglasses

    Updated: 2011-04-26 03:54:44
    With Video Recording Sunglasses you can easily capture every important moment. Experience the added convenience of hands-free video with this stylish color camera. Simply pair it with any compatible video recorder for quick playback and effortless video review.

  • SPY EARPHONE CAMERA

    Updated: 2011-04-26 03:54:43
    The ultimate, state-of-the-art hidden spy camera, when you are looking for small, covert and a body worn the Spy Earphone Camera is the perfect discreet choice, delivering crystal-clear high-quality video.

  • Security-minded Storage Devices

    Updated: 2011-04-22 04:38:19
    While the software industry continues to make strides in the area of security and data protection, the hardware industry shouldn’t be underestimated. With the announcement of storage devices like Toshiba’s MK-61GSYG hard disk drives, it may only be a matter of time before we see even more creative security features for hardware (due, in part, [...]

  • SQL Slammer Worm Regains Momentum Blog Central

    Updated: 2011-04-21 06:34:52
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer About Me Denys Ma Software Engineer Read More Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Meet the Bloggers Abhishek Karnik Adam Pridgen Adam Wosotowsky Aditya Kapoor Ahmed Sallam Alex Hinchliffe Alex Thurber Allysa Myers Anil Ramabhatta Anna Stepanov Apurv Anand Arun Pradeep Avelino Rico Jr Ben Edelman Bhaskar Krishna Bing Sun Brad Antoniewicz Brant Yaeger Brian Kenyon Brian Mann Carlos Castillo Cedric Cochin Chen Yu Chintan Shah Chris Barton Craig Schmugar Dan Sommer Dave Klenske David DeWalt David Marcus David Rayhawk David Scharoun Dennis Elser Denys Ma Di Tian Dirk Kollberg Dmitri Alperovitch Dmitry

  • Saving paper Way when printing in Kingsoft Office 2010(1)

    Updated: 2011-04-20 12:57:39
    20th, March, 2011 from KSOffice Team Many times, we print some articles for reading, because you can not plug into a computer all day long in the pocket; sometimes we make changes to print some document, as thinking to use color-coded signs on the computer is not an easy operation … … there is always something [...]

  • Data Breach Report Overload

    Updated: 2011-04-19 18:02:54
    It’s data breach report day today. Or, so it seems. My brain just ‘sploded on overload from all the fresh tasty stats received. There’s not enough time today to go through everything with a fine-toothed comb. Suffice to say: Data breaches are continuing to happen in growing numbers. Basic security practices still aren’t happening. As [...]

  • Dead Drop’ File Sharing Invokes Spy Novels Drug Deals Blog Central

    Updated: 2011-04-19 15:57:50
    , Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer About Me Francois Paget Senior Threat Researcher Read More Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Meet the Bloggers Abhishek Karnik Adam Pridgen Adam Wosotowsky Aditya Kapoor Ahmed Sallam Alex Hinchliffe Alex Thurber Allysa Myers Anil Ramabhatta Anna Stepanov Apurv Anand Arun Pradeep Avelino Rico Jr Ben Edelman Bhaskar Krishna Bing Sun Brad Antoniewicz Brant Yaeger Brian Kenyon Brian Mann Carlos Castillo Cedric Cochin Chen Yu Chintan Shah Chris Barton Craig Schmugar Dan Sommer Dave Klenske David DeWalt David Marcus David Rayhawk David Scharoun Dennis Elser Denys Ma Di Tian Dirk Kollberg Dmitri

  • AutoRun malware Blog Central

    Updated: 2011-04-19 15:57:34
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive April 2011 25 March 2011 57 February 2011 37 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 306 Corporate 198 Enterprise 338 McAfee Labs 1061 Tags 1 million guarantee access to live fraud resolution agents Acquisition Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security encryption Endpoint Protection

  • Peer to Peer file sharing Blog Central

    Updated: 2011-04-19 15:57:33
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive April 2011 25 March 2011 57 February 2011 37 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 306 Corporate 198 Enterprise 338 McAfee Labs 1061 Tags 1 million guarantee access to live fraud resolution agents Acquisition Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security encryption Endpoint Protection

  • USB drives Blog Central

    Updated: 2011-04-19 15:57:32
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Archive April 2011 25 March 2011 57 February 2011 37 January 2011 28 2010 459 2009 398 2008 294 2007 417 2006 169 Blogs Consumer 306 Corporate 198 Enterprise 338 McAfee Labs 1061 Tags 1 million guarantee access to live fraud resolution agents Acquisition Channel Partners Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom Cybercrime data breach Data Protection Dave DeWalt DLP Email Web Security encryption Endpoint Protection

  • Busy Month for Apple Blog Central

    Updated: 2011-04-19 15:57:27
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer About Me Francois Paget Senior Threat Researcher Read More Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Meet the Bloggers Abhishek Karnik Adam Pridgen Adam Wosotowsky Aditya Kapoor Ahmed Sallam Alex Hinchliffe Alex Thurber Allysa Myers Anil Ramabhatta Anna Stepanov Apurv Anand Arun Pradeep Avelino Rico Jr Ben Edelman Bhaskar Krishna Bing Sun Brad Antoniewicz Brant Yaeger Brian Kenyon Brian Mann Carlos Castillo Cedric Cochin Chen Yu Chintan Shah Chris Barton Craig Schmugar Dan Sommer Dave Klenske David DeWalt David Marcus David Rayhawk David Scharoun Dennis Elser Denys Ma Di Tian Dirk Kollberg Dmitri

  • Six Reasons for choosing Kingsoft Powerword 2010

    Updated: 2011-04-19 12:08:42
    19th, April, 2011 from KSOffice Team Kingsoft PowerWord 2010 is an ideal e-dictionary for people at all levels, designed to meet your translation, research or study needs at your fingertips. This is why the software has 20 million users today, and is recommended by over 50,000 educational insitutes, government agencies and global corporations. There are many good [...]

  • Explaining security protocols

    Updated: 2011-04-15 12:48:13
    Many papers and online explanations of security protocols are dense and quite complicated. And sometimes even security professionals don’t understand the explanations. When I first started at CMU, there was a class called “Internet Security”. I went to the first lecture and promptly dropped the class. I understood practical security – but this class focused [...]

  • How to use PDF converter for Windows

    Updated: 2011-04-15 09:57:01
    15th, April, 2010 from KSOffice Team AnyBizSoft PDF Converter is an easy-to-use application that helps you convert PDF to Word, Excel, PowerPoint, EPUB, HTML or Text in just 3 steps: 1. Launch the program; 2. Import PDF files and select the conversion type; 3. Convert PDF files with one click.Now just the follow the guide below and get start [...]

  • LizaMoon the Latest SQL-Injection Attack Blog Central

    Updated: 2011-04-13 07:36:18
    Skip over navigation McAfee® Blog Central Blog Central Corporate McAfee Labs Enterprise Consumer About Me Jim Walter Jim Walter currently serves as manager of the McAfee Threat Intelligence Service MTIS for McAfee Labs , and focuses Read More Feeds Podcasts Consumer Blog Feeds Corporate Blog Feeds Enterprise Blog Feeds McAfee Labs Blog Feed McAfee Podcasts McAfee Twitter Feed Meet the Bloggers Abhishek Karnik Adam Pridgen Adam Wosotowsky Aditya Kapoor Ahmed Sallam Alex Hinchliffe Alex Thurber Allysa Myers Anil Ramabhatta Anna Stepanov Apurv Anand Arun Pradeep Avelino Rico Jr Ben Edelman Bhaskar Krishna Bing Sun Brad Antoniewicz Brant Yaeger Brian Kenyon Brian Mann Carlos Castillo Cedric Cochin Chen Yu Chintan Shah Chris Barton Craig Schmugar Dan Sommer Dave Klenske David DeWalt David

  • If it were simple, we’d do it all the time.

    Updated: 2011-04-12 11:00:09
    A few years ago, I wrote a post about “the power of s” explaining how important it is to use https instead of http, and how that made things more secure. Strictly speaking, what I wrote then was true. It’s very important to implement SSL, and SSL can indeed make communications secure. But it’s more [...]

Current Feed Items | Previous Months Items

Mar 2011 | Feb 2011 | Jan 2011 | Dec 2010 | Nov 2010 | Oct 2010