According to reports, about 50,000 credit card accounts were breached when the servers of a third-party processing company were compromised. - Cyber-criminals
hacked into a credit card processing company and stole information from about
50,000 Visa and MasterCard cardholders, the two companies said March 30.
In separate
statements, officials with Visa and MasterCard said they were aware of the data
breach at the third-party processing...
: IT Security Network Security News Reviews eWeek HOME NEWS REVIEWS STORAGE SECURITY DESKTOPS NOTEBOOKS MOBILITY Cloud BLOGS WHITE PAPERS WEBCASTS New Era Networks Security News Security Reviews Security Blogs IT Infrastructure Government IT Open Source Applications Videos All eWeek Topics Home IT Security Network Security News Reviews News Reviews SINET IT Security Entrepreneur's Forum : 10 Key Takeaways IT Security Network Security News Reviews : SINET IT Security Entrepreneur's Forum : 10 Key Takeaways By Chris Preimesberger on 2012-03-30 The San Francisco-based Security Innovation Network SINET held its sixth annual IT Security Entrepreneurs' Forum March 21 and 22 at Stanford University's Frances Arrillaga Alumni Center , and as one might imagine , the presentations and panel
This is the single best presentation of Harris’ argument that I’ve ever seen him make. He finally addresses common counterarguments, such as: Well, I can decide to do x right now—and then I can change my mind–or even change my mind again! This proves I have free will. This is the first time I’ve seen [...]
While Kaspersky, Dell and others may have disrupted the Kelihos, experts with Seculert and Damballa say cyber-criminals are still spreading the botnet. - Security
researchers from Kaspersky Lab, Dell SecureWorks and other places generated a
lot of headlines this week with their announcement that they had taken down a new version of the Kelihos peer-to-peer botnet.
In a March 28
post on Kasperskys SecureList
blog, Stefan Ortloff, a security exper...
Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud Public Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Jeff Loughridge Howard Marks Joe Onisick Upcoming Events Interop May 6-10 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovationsincluding cloud computing , virtualization , security , mobility and data
The Internet giant joins the likes of Apple, Google and Microsoft in instituting the consumer privacy technology on their Websites. - Yahoo late this year will institute a quot;Do Not Track quot; policy across all its Websites, joining such companies as Apple, Microsoft, Google and Mozilla in giving online consumers a tool to limit the amount of personal information that is collected.
Yahoo executives March 28 announced that use...
Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud Public Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Jeff Loughridge Howard Marks Joe Onisick Upcoming Events Interop May 6-10 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovationsincluding cloud computing , virtualization , security , mobility and data
Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud Public Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Jeff Loughridge Howard Marks Joe Onisick Upcoming Events Interop May 6-10 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovationsincluding cloud computing , virtualization , security , mobility and data
EventSentry was selected the winner in the Event Log Monitoring category of the WindowSecurity.com Readers' Choice Awards. GFI EventsManager and ManageEngine EventLog Analyzer were runner-up and second runner-up respectively.
Every year there are literally tens of thousands of new vulnerabilities discovered across the various software and hardware technologies we rely upon every day. Simple math would seem to dictate an impossible task to manage all of these vulnerabilities and to make the real-world, priority-based decisions on them. Vulnerability management is one thing, but for [...]
Micro Systemations XRY app can crack passcodes for iPhones and Android devices within minutes, and is being used by a growing number of law enforcement agencies. - The four-digit
password on Apples iPhone is no match for Micro Systemations XRY application.
The password
on the popular smartphone can probably keep a regular person who finds the
device from breaking into it. However, the software from the Swedish company,
which it sells to law enforcement ag...
In part two of this article about Securing Windows desktops, the author discusses endpoint firewalls, data protection, and whitelisting of applications as to make sure that readers are fully aware of the capabilities and limitations of each security solution.
Since Rich is on the road this week, Martin and Zach are joined by none other than friend of the podcast, Josh Corman. Which is not that surprising, since there’s only one story we’re talking about tonight, the latest Verizon Data Breach Investigation Report. There’s a lot to talk about again in this year’s report, [...]
NEWS ANALYSIS: U.S. Senators Charles Schumer and Richard Blumenthal say asking for social media passwords may be a violation of federal law. For job applicants and employers, this could open a potential legal minefield. - The
recent practice of employers and would-be employers requesting
Facebook and other social network log-in information is probably a violation of
equal employment laws, say two Senators. U.S. Senators Charles Schumer (D-N.Y.)
and Richard Blumenthal (D-Conn.) have asked the U.S. Equal Employment...
Three weeks after five alleged members of LulzSec were arrested, hackers claiming the LulzSec banner say they attacked a Website for military singles. -
A hacker group
using the name quot;LulzSec quot; is claiming responsibility for breaking into
the database for a Website for single members of the military over the weekend.
According to a
post on the blog
site Pastebin.com March 25, hackers using the names quot;LulzSec quot;
and quot;Lul...
Consumer advocacy groups applauded the FTCs report, though some question if it goes far enough. Industry groups say the recommended policies would stifle innovation. - The Federal
Trade Commissions report calling for a combination of federal laws and
self-policing among companies to protect online user privacy is drawing cautious
praise from consumer advocacy groups, though some claimed the suggestions do not
go far enough in establishing safeguards.
At the s...
The online program tests business owners across eight installments with different security themes. - Web and mobile security
specialist AVG Technologies launched SMB BootCamp, a free, online mix of video
clips and Web content divided into eight weekly themed installments, each with
a short, multiple-choice questionnaire that must be completed correctly in
order to qualify for the next stage. Th...
via lh6.googleusercontent.com Ouch. Posted via email from danielmiessler.com | posterous Related ContentDucks in WaterThe First Result When Googling SantorumYouTube Downloader | Chrome Web StoreWho the Hell is AirSage?The Happiness Process
This fascinating article explores the very real issue of the rise of robotic technology and how it will affect the job market in coming years and decades. I feel the content rambles a bit, and fails to properly summarize, but it’s great stuff overall. Here’s my summary of the current jobs situation, within the context [...]
[ 27.03.12: Sold within one day. Thanks everyone. ] I am currently selling my previous MacBook Pro that is in great condition with the following specs: 2010 Model 15″, 1400×900 2.8 GHz Core 2 Duo 8GB 1067 MHz DDR3 256GB SSD Drive I just reformatted it, put 10.7.2 on it, and it’s ready to go. [...]
via blogs.discovermagazine.com Bible: 0, Universe: 1 Posted via email from danielmiessler.com | posterous Related ContentTry a BookThis is my Favorite PictureA Digital IO WorkflowInteractive Animation Brings Starry Night to LifeBrowser Combat
In its final report, the agency urged companies to police themselves, but said government intervention is also needed. - The Federal Trade Commission is
putting pressure on both Congress and tech companies to take actions to protect
user privacy and give them more information on how their personal data is
collected and used.
In its final report, released March 26, the FTC takes
aim at vendors whose mobile devices...
: IT Security Network Security News Reviews eWeek HOME NEWS REVIEWS STORAGE SECURITY DESKTOPS NOTEBOOKS MOBILITY Cloud BLOGS WHITE PAPERS WEBCASTS New Era Networks Security News Security Reviews Security Blogs IT Infrastructure Government IT Open Source Applications Videos All eWeek Topics Home IT Security Network Security News Reviews News Reviews IBM : The Good and Bad About Internet Security
In addition to bringing you the latest in AppSec research and news in this blog, we will begin presenting short educational briefings on key subjects within the application security space. We hope you will enjoy and learn from these short posts. We value your opinion, so please let us know if there are any concepts [...]
IT Security Network Security News Reviews eWeek HOME NEWS REVIEWS STORAGE SECURITY DESKTOPS NOTEBOOKS MOBILITY Cloud BLOGS WHITE PAPERS WEBCASTS New Era Networks Security News Security Reviews Security Blogs IT Infrastructure Government IT Open Source Applications Videos All eWeek Topics Home IT Security Network Security News Reviews News Reviews Microsoft Targets Zeus Botnets With Financial Services Partners
I’ve known for many years now that I’d write books one day, but even up to just a few months ago I thought my first book would come years from now. But something has changed my mind: perhaps the overwhelming ignorance I’ve seen around the current election cycle, or maybe something else. But I think [...]
Bassett, a New York City statistician, had just finished answering a few character questions when the interviewer turned to her computer to search for his Facebook page. But she couldn’t see his private profile. She turned back and asked him to hand over his login information.Bassett refused and withdrew his application, saying he didn’t want [...]
via youtube.com Posted via email from danielmiessler.com | posterous Related ContentGame of Thrones Violin Rock CoverAn Inspirational VideoNew Headz Up App | SNLA Creative SongSeriously Fast Lyrics
Delegation was the first skill I was forced to learn when I made the jump from a technical to a managerial position. These were the toughest times for me. I’m a geek and being in control of everything (to the finest detail) defines me. Not only that, but since I can pick up skills quickly, [...]
Facebook is officially pushing back against employers who want job applicants' Facebook passwords. - Facebook, perhaps anxious to avoid public controversy as it prepares for a much-publicized initial public offering, is moving to squelch a widely reported practice of employers asking job applicants for their Facebook passwords.
If you are a Facebook user, you should never have to share your pass...
NEWS ANALYSIS: The Verizon study finds that the best way to prevent data breaches is not expensive or new, but rather simple. The fact that businesses dont adhere to good security practices is more frightening than the breaches themselves. - Verizons
annual quot;Data
Breach Investigations Report quot; includes some sobering findings that show just
how pervasive social and political hacking has become. So-called
hacktivism was responsible for 58 percent of all data stolen in 2011.
Nearly 80 percent of attacks were opportunistic, ...
You’re not getting paid as well as you should. I know this not only because you’re bothering to read this, but also because most techies are crap at extracting cash from their employers. It shouldn’t shock you too much to learn that I, as a City headhunter and former contractor, focus quite hard on money [...]
Basically, the bill will make sure teachers can discuss creationism in the classroom, as well as global warming denialism. The House version states, This bill prohibits the state board of education and any public elementary or secondary school governing authority, director of schools, school system administrator, or principal or administrator from prohibiting any teacher in [...]
I find the whole cloud of hush around the origins of sexuality to be fascinating, as it reeks to me of political correctness (see: sensitivity-based truth avoidance). Basically, because it’s such a charged topic (and therefore obscured from direct study) I continue to try to model the matter. This story from The Atlantic today gives [...]
Female chimpanzees treat sticks and small logs as dolls by cuddling them, creating games and even putting them to bed, new research finds. Since young male chimps were less inclined to play dollies, the authors say their study presents the first evidence of an animal species in the wild in which play differs between males [...]
My idea is that the entire passenger cabin would be separate from the rest of the plane, like a shotgun shell waiting to be put in the shotgun. Passengers would take their seats in the cabin “tube,” located in the airport terminal. When the airplane arrives, it lines up with the terminal and smoothly ejects [...]
We’ve been working hard for the last 2 months since 5.61TEST4, and I’m pleased to announce the results: Nmap 5.61TEST5. This release has 43 new scripts, including new brute forcers for http proxies, SOCKS proxies, Asterisk IAX2, Membase, MongoDB, Nessus XMLRPC, Redis, the WinPcap remote capture daemon, the VMWare auth daemon, and old-school rsync. Better [...]
It has been roughly a year since we released our original paper titled “In Configuration We Trust.” The goal of that research was to try to draw awareness to the fact that a lot of security improvement can be made simply by how you architect your network and configure your operating systems and applications. These [...]
Verizon just released its 2012 Data Breach Investigative Report which contains findings contributed by global agencies such as the U.S. Secret Service, the Dutch High Tech Crime Unit, the Irish Reporting and Information Service, the Australian Federal Police and the London Metropolitan Police. I thought it would be good to put together a quick summary [...]
via youtube.com This guy is a treasure. Posted via email from danielmiessler.com | posterous Related ContentNeil deGrasse Tyson on the Meaning of Life | RedditNeil deGrasse Tyson’s Reddit AMADavid Simon on the End of the American EmpireNew Headz Up App | SNLA Creative Song
via youtube.com If you’re not watching Key and Peele you’re f’ing up by the numbers. Trust. Believe. Posted via email from danielmiessler.com | posterous Related ContentHow Not to Do a PresentationSeriously Fast LyricsA Creative SongWicked Table Tennis Points from Recent TournamentsNew Headz Up App | SNL
via youtube.com A phenomenal cover of a phenomenal piece of music. Posted via email from danielmiessler.com | posterous Related ContentGame of Thrones Recap VideoPhenomenal Speech by a War VeteranNew Headz Up App | SNLExit Music (For A Film) – Radiohead (Cover)Seriously Fast Lyrics
Chris Wysopal recently authored an article detailing static analysis that was featured in The Testing Planet. “What is Static Analysis?” provides a comprehensive and in depth yet understandable explanation of the ins and outs of static testing. Using graphics and examples of code, Chris begins with the loading phase and travels through the Application Modeler, [...]
In this, Part 4, we'll look more closely at the criteria for choosing a comprehensive identity management solution for an organization or a federated identity management solution.
Miss our live Vulnerability Expert Forum webinar earlier this week? Never fear, I’ve put the recording + slides + Q&A all together here for your convenience. Take your pick. Additionally, find this month’s Security Bulletin here, a list of all the Audit IDs here, and the PDF of the presentation here. If you have additional questions not [...]
eEye has always taken a “zero gap” approach to our threat management product strategy. That thinking has been the driver for our market firsts in support for new technologies such as cloud, mobile, and virtualization vulnerability management. These new technologies bring tremendous benefits, but they also bring risks with them as well, which must be [...]
March – the month that brings us spring training, NCAA March Madness, Pi Day, and St. Patrick’s Day (including the requisite Shamrock Shake). To go along with these exciting events, Microsoft has chipped in with six security bulletins for the March edition of Patch Tuesday. By now, hopefully everyone realizes that DLL hijacking affects a [...]
It’s a good thing we’ve started double-checking Rich’s work, because he hasn’t been that reliable as of late. Luckily Martin is recording this week, so the audio quality is back to it’s normal levels, but that means the content is back to normal levels as well. Which actually turns out to be a good thing, [...]
In this article, we'll introduce the idea of thinking about private cloud security within the context of each of the five essential characteristics that define a cloud-based solution.
Dell SecureWorks Chief Technology Officer Jon Ramsey took a few minutes out of his day at the RSA Conference to talk to me about a new study his team had recently written on series of attacks they dubbed Sin Digoo Affair. In addition to being a detailed analysis of the tools and actions performed by [...]
My first interview this year at the 2012 RSA Conference was with Urvish Vashi from AlertLogic. We talked briefly about the recent acquisition of ArmorLogic, but my real interest was the State of Cloud Security Report issued by AlertLogic. It’s an interesting report and gives us some fuel for the debate about which is more [...]