Every week it seems like there is a new story about a popular website or application having privacy issues that put its users at risk. With millions of apps receiving billions of downloads, it is important users are aware of the risks that they face when downloading and using apps. This infographic uses real world cases to outline the threat to user privacy posed by mobile apps.
When the patients received ketamine, their depression symptoms significantly improved within 40 minutes, and remained improved over 3 days. Overall, 79% of the patients improved with ketamine, but 0% reported improvement when they received placebo. via medicaldaily.com A truly stunning find. I imagine a ton of good is going to come from this. I wonder [...]
Stop me if you’ve heard this one before: there is a new piece of malware and this one is even worse than the last one. It is bigger, scarier, more complex and will take years, according to some estimates, to actually ever know what the malware really does. And of course it already has a [...]
The White House on May 30 introduced a government-industry alliance that will carry out a series of initiatives aimed at curtailing malware-driven botnets through information sharing, global collaboration and public education. - The White House has announced a series of initiatives in partnership with government agencies and the private sector to combat botnets.
The initiatives, which were announced May 30 at an event at the White House, are the result of a partnership between the Homeland Security and Commerce Department...
NEWS ANALYSIS: The Flame malware that has been discovered infecting computer systems mainly in the Middle East is raising more questions than answers about its origins. Researchers dont really know if it's new, if it's actually state-sponsored or where it really came from. - The blogosphere and the nontech media are all abuzz about Flame, the newly exposed malware that is apparently wreaking havoc with Iranian computers. Its also creating problems elsewhere in the Middle East, but apparently hasnt spread significantly beyond there.
But is Flame really a new threat, or ...
Employee monitoring through social media platforms can improve security, but it raises important ethical and legal considerations, a Gartner report indicates. - It might be worth thinking about keeping your friends close, but keeping your Facebook friends carefully cordoned off from the eyes of your employers, if a recent report from IT research firm Gartner is any indication. The study found that corporate monitoring of employee behavior on social media si...
Adoption of cloud computing and mobile devices is boosting IT security spending among small businesses, according to an IDC report. - Small and midsize businesses' spending on security technology is growing at a healthy clip and is set to pass $5.6 billion in 2015, according to a new report from IDC. In fact, SMBs' spending on security products and services is projected to nearly double the 5 percent to 6 percent annual growth pr...
This article will look at emerging technologies in mobile security, the security risks surrounding mobile platforms and steps to secure your mobile devices and their contents.
Zach was a little late, but Rich and Martin start with talks of their recent travels (Martin wins) and prepping for DefCon. Then we jump into the latest super hot security news. Network Security Podcast, Episode 279, May 29, 2012 Time: 38:34 Show notes: IBM bans Siri. Must not like the snark. FBI forms net [...]
A United Nations technology agency is issuing an alert for countries to be on the lookout for cyber-espionage malware known as Flame, which has hit computer systems in the Middle East heavily, according to Reuters. - The United Nations' International Telecommunication Union is issuing a warning for nations to be on guard for the newly identified Flame malware, according to a report.
quot;This is the most serious [cyber] warning we have ever put out, quot; Marco Obiso, cyber-security coordinator for the U.N.'s...
The new organization is designed to work as an early-warning system against federal legislation the group thinks will endanger privacy and freedom on the Web. - Some of the organizers of the Internet protest that led to Congress ditching the controversial SOPA and PIPA legislation in January are now looking to make it easier to fight back against similar federal bills.
Alexis Ohanian, co-founder of the social media site Reddit, and Fight for the Future hav...
Around this time last year I wrote a blog on the Pivot Grids within Retina Insight and how they allow a user to custom build historical reports based on almost every piece of data collected by Retina Insight. Recently I spoke with an analyst on this same topic and he was very pleased to see that we [...]
Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud Public Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Jeff Loughridge Howard Marks Joe Onisick Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing , virtualization , security , mobility and data
Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud Public Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Jeff Loughridge Howard Marks Joe Onisick Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing , virtualization , security , mobility and data
Many peacocks hide their feathers and call that their pride. ~ Frederich Nietzsche I am getting ready to consider moving from Brooks Brothers to Blank Label shirts. I have been getting more into the quality of my shirts over the last couple of years, and as of about a year ago I’ve been 100% Brooks [...]
As he shows, America is both especially unequal and has especially low mobility. But he also argues that because we are even more unequal now than we were a generation ago, we should expect even less social mobility going forward. via krugman.blogs.nytimes.com An interesting system for estimating social mobility based on parental income at a [...]
Robert Heinlein wrote a book a long time ago called Time Enough for Love in which he described all the various things a human being should be able to do. It closely maps with Ralph Waldo Emerson’s concept of a full person, evidently. Go here to calculate your score on this test (your Heinlein score). [...]
NEWS ANALYSIS: Google's privacy policies allow the company to collect information about anyone and to combine information from a wide variety of sources into an overall, highly detailed profile that tells everything there is to know about you. However, Google will soon have to come to terms with the European Union's privacy laws, which ban this kind of comprehensive data collection about it citizens. - One of the secrets to really effective spying is to collect all available information about your target, no matter how mundane or trivial. This approach has been used by government intelligence agencies since the beginning of spies. The CIA and NSA collect vast quantities of such information, and th...
CEO Eugene Kaspersky says iOS-based devices, such as the iPhone and iPad, will need antivirus software, and he laments that Apple won't let his company develop it. - When more than 600,000 Mac users were under siege last month by the Flashback malware infecting their systems, officials at Kaspersky Lab were among the most vocal critics of Apples response to the security problem.
They and security experts from other organizations chastised Apple for the two-mont...
The mayor of a northern New Jersey city has been charged with conspiring with his son to bring down a Website calling for the mayor's recall and intimidate anyone involved with it. - A New Jersey mayor has been arrested along with his son on charges they conspired to hack a Website calling for the mayor's ouster as part of a campaign to target the mayor's critics.
Felix Roque, mayor of the Hudson County town of West New York, and his son Joseph Roque were arrested Thursday for ...
It is still not clear to me what you actually recommend—nor is it clear why your views about profiling, if true, wouldn’t extend to all intelligence work, or even to immigration. Should we issue visas to people at random, or should we pay more attention to those applying from Yemen, Pakistan, and Somalia? For those [...]
Earlier this week, Brian Prince over at Security Week posted an article on a subject that we’ve always been passionate about here at eEye, now BeyondTrust, Research – and that’s configuration. More specifically, the incredible impact that smart, effective configuration can have on reducing attack surface for any size organization. From Brian’s article, I agree [...]
Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Lee H . Badman Bio Archive Lee H . Badman Network Computing Blogger Home News and Analysis Research Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud Public Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Jeff Loughridge Howard Marks Joe Onisick Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest
This time, it's French regulators who are saying that the search giant is being uncooperative with investigators probing the company's new privacy policies. - Google officials once again are being accused by regulators of not being cooperative with investigators looking into privacy issues concerning the dominant Web 2.0 company.
This time, the complaints are coming from Europe Union (EU), where a French agency taking the lead in the investigation over q...
Two researchers have submitted a draft proposal to the Internet Engineering Taskforce about a way to catch forged SSL certificates and address challenges to the level of trust in certificate authorities. - Two researchers have proposed an extension to TLS, or transport layer security, as a solution to some of the security challenges facing the Secure Sockets Layer certificate ecosystem.
Their proposal comes after a troublesome year for certificate authorities (CAs) during which a number of high-profi...
: IT Security Network Security News Reviews eWeek HOME NEWS REVIEWS STORAGE SECURITY DESKTOPS NOTEBOOKS MOBILITY Cloud BLOGS WHITE PAPERS WEBCASTS New Era Networks Security News Security Reviews Security Blogs IT Infrastructure Government IT Open Source Applications Videos All eWeek Topics Home IT Security Network Security News Reviews News Reviews Email Security : 10 Steps for Dealing With Dangerous Messages IT Security Network Security News Reviews : Email Security : 10 Steps for Dealing With Dangerous Messages By Jeffrey Burt on 2012-05-24 The recent success authorities have had in taking down dangerous botnets has helped drive down the amount of spam flooding into business and consumer email accounts . In a report on security in 2011 released late last year , Cisco Systems found a
Over the past several weeks, Veracode Director of Marketing Fergal Glynn has been authoring a series on application security for security news blog Threatpost. Titled “A CISO’s Guide to Application security,” the five-part series focuses on defining application security, outlining the elements of a comprehensive appsec program, educating about application and software related risks, determining the true cost of a data breach, and providing recommendations to CISOs for managing enterprise-level appsec. Now that the series has come to a conclusion we have highlighted each post below along with links to the full articles.
. Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Greg Ferro Bio Archive Greg Ferro Home News and Analysis Research Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud Public Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Jeff Loughridge Howard Marks Joe Onisick Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing ,
, Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud Public Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Jeff Loughridge Howard Marks Joe Onisick Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing , virtualization , security , mobility and
Panda Cloud Office Protection was selected the winner in the Endpoint Security category of the WindowSecurity.com Readers' Choice Awards. AccessPatrol and Netwrix USB Blocker were runner-up and second runner-up respectively.
A new report from McAfee said the amount of Android malware detected during the first quarter of 2012 shot up 1,200 percent. Malware targeting Windows PCs jumped as well, the firm reported. - Mobile malware targeting Google Android devices exploded in the first few months of 2012, according to a new report from McAfee.
Nearly 7,000 Android threats were identified and collected through the end of the 2012 first quarter, according to McAfee's threat report.
This represents a more tha...
, Network Computing www.networkcomputing.com RSS Newsletters Current Issue Issue Archives Slideshows Whitepapers About Us Home News and Analysis Research Tech Centers Deduplication End to End APM IPv6 Next Gen Network Private Cloud Public Cloud WAN Security Channels Backup Recovery Cloud Computing Cloud Storage Data Center Data Protection Networking Mgmt Openflow Servers Storage Storage Mgmt UC VoIP Virtualization WAN App Acceleration Wireless Bloggers Lee H . Badman Greg Ferro Stephen Foskett Mike Fratto David Hill Jeremy Littlejohn Jeff Loughridge Howard Marks Joe Onisick Upcoming Events Interop NY Oct . 1-5 Interop is the only event to give you a comprehensive and unbiased understanding of all the latest innovations-including cloud computing , virtualization , security , mobility and
Google is alerting users infected with DNSChanger malware that they should clean their computers or face possibly losing Internet access in July. The FBI issued a warning of its own about the malware in April. - Google is warning Web users infected with the DNSChanger malware that if they do not clean their computer before the FBI's impending deadline, they may lose access to the Internet.
Google said it plans to notify as many as 500,000 users that are still infected with the malware, which was used by ...
IBM has banned Apple's Siri digital assistant--along with other apps and services--from its networks out of concern for security and privacy. Big Blue realizes the move to enable workers to bring their own devices to work offers both benefits and challenges. - As well-mannered and well-intentioned as she may be, Apples Siri is not welcome at IBM at least not on the companys networks.
According to an MIT Technology Review report, IBM has banned the use of Apples Siri digital assistant on its networks because of security and privacy concerns.
The compan...
“Enforcing Python’s engines, I wrote a script that generates some nicely crafted unique Http requests, one after the other, generating a fair load on a webserver, eventually exhausting it of resources. this can be optimized much much further, but as a proof of concept and generic guidance it does its job. As a guideline, the main [...]
The framework has also recently received an update but, most important of all, has also received a very prominent backer: Microsoft. “Even though many vendors have followed Microsoft’s lead in providing comprehensive security updates to customers, the formats vendors use vary. CVRF provides the entire industry with a way to share and present data in [...]
Climate scientists have been consistently downplaying and underestimating the risks for three main reasons. First, their models tended to ignore the myriad amplifying carbon cycle feedbacks that we now know are kicking in (such as the defrosting tundra). Second, they never imagined that the nations of the world would completely ignore their warnings, that we [...]
After the scary Canadians ransacked our show, Rich needed some alone time in the cornfields of some midwestern state. Respecting Rich’s need for “meditation” (or a quick sell of all of his Facebook shares), Martin and Zach, in their respective bleary-eyed states, recorded anyway. Network Security Podcast, Episode 278, May 22, 2012 Time: 37:05 Show notes: [...]
As security researchers, we’re always looking for ways to put the security conversation in the spotlight; be it an interesting fact, figure or editorial. By now you’ve probably read about how Google Chrome has achieved the number one browser position, worldwide (according to StatCounter). Coming in at about 32.76% of the global browser market share, [...]
Did you know that during the course of this year, the number of Wi-Fi connected devices will exceed the world’s population? This incredible statistic highlights the ubiquitous nature of Wi-Fi. However, the convenience of having public Wi-Fi available practically everywhere comes at the cost of greater risk to users. This infographic delves into the anatomy of a Wi-Fi hack and simple precautions Wi-Fi users should take to ensure that they are surfing safely.
BDD-Security is a framework written in Java and based on JBehave and Selenium 2 (WebDriver) that uses predefined security tests and an integrated security scanner to perform automated security assessments of web applications. Don’t scanning tools already to that? Partly. Scanning tools are good at finding certain types of vulnerabilities, such as injection vulnerabilities (Cross [...]
To see how the denial of the obvious has become a new article of faith for secular liberals, consider the response I received from Chris Stedman. In an article published in The Huffington Post, Stedman urged me to visit a mosque with him. This invitation was much celebrated online. Many people appear to believe that [...]
Fables should be taught as fables, myths as myths, and miracles as poetic fantasies. To teach superstitions as truths is a most terrible thing. The child mind accepts and believes them, and only through great pain and perhaps tragedy can he be in after years relieved of them. ~ Hypatia of Alexandria Related ContentMistranslated Myths [...]
Posted via email from danielmiessler.com | posterous Related Content4S FlowerFlowers and StoneCrescent Tree Shadows from EclipseOverlooking SFCouldn’t Care Less
Cyberwar remains a hot topic of conversation in both political and technology circles. But Tenable Chief Security Officer Marcus Ranum asserts that much of the discussion has been--and remains--misleading and inaccurate. In this presentation from the 2012 RSA Conference, Marcus outlines his thoughts on the multiple problems that comprise cyberwar to get past the hype and articulate what risks actually exist. Watch now on YouTube.
Happy Friday all, and I hope everyone had a great week. Here are the top headlines from this past week in the security world. Enjoy! Cyber Security Index: “Cyber Security Index Highlights Political Threats, Business Partner Risk” by Paul Roberts (@paulfroberts). This article from Threatpost looks at this year’s Index of Cyber Security score of [...]
But here in one of the richest corners of the country, the tech elite display an ambivalent, sometimes contradictory approach to wealth. Money, as one scholar of the Valley described it, is treated as a measuring stick, gauging the power of the companies that entrepreneurs have built, rather than a thing to display. “They use [...]
I’ve been having a long-running debate with two other hardcore gamer friends of mine about a comment that was made a couple years ago about Starcraft 2. The game had just come out and the three of us were chatting about it when they asked me what I thought of the end of the game. [...]
Miss our live VEF webinar earlier this week? In case you did, I’ve put all of the content together for you below. Enjoy! Additionally, access this month’s Security Bulletin, a list of all the Audit IDs, and the PDF of the presentation. If you have additional questions you’d like to ask the research team about [...]
In this, our third and final interview segment with Dan Guido, Co-Founder and CEO of Trail of Bits, Dan talks about how organizations should prepare to face security threats, and attack vectors that pose the greatest threat to enterprises today. Watch the interview.
It keeps happening over and over again. I speak to a prospect, and they do not want yet another vulnerability report with pages and pages of assets and vulnerabilities. Every tool vulnerability assessment scanner can produce this with various degrees of customization and consolidation but a 1,000 page report for a few dozen assets doesn’t [...]
I am stunned that Blizzard has had such a poor launch for Diablo III. I couldn’t even get onto the server for two hours on the first night, and I just got killed by Belial because the lag was so bad that I was unable to even move. We’re talking FPM (frames per minute) here. [...]
By now you’ve heard the exciting news that eEye was acquired by BeyondTrust. We are both very excited about the acquisition and look forward to what the future has in store. Earlier this week executives from both companies hosted a live webcast where they discussed the benefits, our joint value proposition and how our products will [...]
When a marketing buzz word sticks like BYOD (Bring Your Own Device), it is inevitable to see it everywhere in an effort to capitalize on the momentum; blogs, literature, SEO, social media, etc. In the past, we have seen great terms like “ecosystem”, “framework”, and my personal favorite “distributed computing”, rise and fall in marketing. [...]
Earlier this morning we announced that eEye Digital Security has agreed to be acquired by BeyondTrust, the industry’s leading provider of Privileged Identity Management (PIM) solutions. This is a very exciting milestone in the history of eEye Digital Security, a company that has long been at the forefront of security product leadership and innovative security [...]
In this article the author investigates whitelisting methods as a way to control which applications users can use, as opposed to privilege management solutions which can dramatically reduce the attack surface within an organization.
Our product team has just put the finishing touches on the newest release of Retina CS, our award-winning Threat Management Console. Version 3.1 expands our market leadership in innovation for helping IT secure the technologies being widely deployed today. As it has been since halfway through 2011, Retina CS remains the only unified vulnerability and [...]