www.PenandCamera.com: Writing Samples: 2010 About | Archive | Photography| Writing | Updates
Writing Archive: 2010

Writing Archives: 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003

Complete stories by date:

December 2010

100,000 Credit Cards Compromised By Data Breach
CitySights NY tour operator was storing card security codes in apparent violation of payment card industry regulations.
InformationWeek (December 22, 2010)

OpenBSD Founder Believes FBI Built IPsec Backdoor
But Theo de Raadt said it is unlikely that the Federal Bureau of Investigation's Internet protocol security code made it into the final operating system.
InformationWeek (December 22, 2010)

Schwartz On Security: Don't Get Hacked For the Holidays
The Gawker data breach highlights how few companies employ passwords for security, and how many Web site users treat them as little more than a nuisance.
InformationWeek (December 22, 2010)

Gawker Details Missteps Behind Security Breach
The Gnosis group apparently faced few defenses in what it called a revenge attack on the prominent online media property.
InformationWeek (December 21, 2010)

Britain Scraps Biometric National ID Cards
The identity register, billed as a way to increase security, was criticized for collecting too much information on United Kingdom citizens.
InformationWeek (December 21, 2010)

Microsoft Overhauls Free Antivirus Software
Firewall integration, a better heuristic antivirus scanner, and network traffic inspection added to Microsoft Security Essentials 2.0.
InformationWeek (December 20, 2010)

Intel Faces Antitrust Probe On Planned McAfee Acquisition
European Commission investigating whether proposed deal would box out competing antivirus products, reports the Wall Street Journal.
InformationWeek (December 20, 2010)

FBI Arrests Four For Insider Trading
Federal authorities allege tech firm insiders sold confidential information relating to Apple, AMD, Dell, Flextronics, and Taiwan Semiconductor.
InformationWeek (December 17, 2010)

HDTVs Vulnerable To Remote Hackers
Lack of built-in security could allow attackers to introduce malicious JavaScript to networks through Internet-connected sets, warns device security vendor.
InformationWeek (December 17, 2010)

FBI Allegedly Planted OpenBSD Backdoor
Security experts have questioned the allegation in the absence of hard evidence, but a former FBI contractor contends the agency installed a crypto backdoor in the open source, Unix-derived operating system 10 years ago.
InformationWeek (December 16, 2010)

HP Acknowledges SAN Password Vulnerability
StorageWorks P2000 G3 storage area network administrators are advised to disable a now well-known default password.
InformationWeek (December 16, 2010)

Consortium To Standardize Tech Supply Chain Security
Trusted Technology Forum launched by the Open Group to help vendors mitigate risks in the manufacture, transport, and sale of hardware and software.
InformationWeek (December 16, 2010)

Anonymous Group Abandoning DDoS Attacks
Operation Payback never rated as more than a nuisance, according to Arbor Networks' analysis of 5,000 confirmed DDoS attacks over the past year at large carriers.
InformationWeek (December 15, 2010)

Android Enabled As SecurID Authentication Device
RSA to release software that turns smartphones into software tokens for accessing enterprise networks.
InformationWeek (December 14, 2010)

WikiLeaks 'Hactivists' Target Fax Machines
Anonymous collective turns to old-school spam as antivirus vendors and Internet providers block access to the the LOIC botnet application.
InformationWeek (December 14, 2010)

Pro-WikiLeaks Botnet Continues Attack On MasterCard Site
"Hacktivists" say their denial of service assaults aren't intended to steal personal financial data, rather to raise awareness of companies that stopped doing business with WikiLeaks.
InformationWeek (December 13, 2010)

Airport Body Scanners Fooled By Human Tissue
Backscatter X-ray systems can't reliably spot even a large quantity of plastic explosives hidden against the skin, warn researchers.
InformationWeek (December 13, 2010)

Zeus Botnet Targeting Retailer Credit Cards
Macy's and Nordstrom cardholders are now at risk from financial malware's latest social engineering attack.
InformationWeek (December 9, 2010)

Former EMC Employees Charged In $1 Million Theft
A firm that was charged with fencing the stolen equipment will implement a mandatory corporate compliance program that may become a model for resellers.
InformationWeek (December 9, 2010)

Snooping Represents A Growing Data Breach Threat
Few organizations are addressing the risk caused by outsiders looking at company information on mobile workers' screens, finds a study by 3M.
InformationWeek (December 8, 2010)

Rustock Most Prolific Botnet
Phishing attacks are down from 2009, but spam, viruses, and malicious web sites are on the rise, reports Symantec.
InformationWeek (December 8, 2010)

Schwartz On Security: WikiLeaks Highlights Cost Of Security
The lack of advanced safeguards on the State Department cables represents an astute non-investment, given their stale content.
InformationWeek (December 8, 2010)

99.98% Of Domains Unsigned By DNS Security Extensions
While adoption of DNSSEC has increased, very few sites are safeguarding their servers against outages or attacks, finds new study.
InformationWeek (December 7, 2010)

Juniper Acquiring Altor Networks For $95 Million
Purchase of virtualization monitoring and security firm brings Juniper a hypervisor-based firewall, intrusion detection, network visibility, and reporting tools.
InformationWeek (December 7, 2010)

Researchers Remotely Defeat IE Protected Mode
Attackers can bypass the Microsoft browser's sandbox and install persistent malware, according to researchers at Verizon Business.
InformationWeek (December 6, 2010)

Internet Explorer Vulnerable To Browser History Hijacking
Researchers found that 1% of the world's most popular websites can force Microsoft's IE to reveal every past website visited unless private browsing controls are enabled.
InformationWeek (December 6, 2010)

Xbox Mod Suit Dropped By Federal Prosecutors
Matthew Crippen had been accused of hacking Microsoft consoles to play pirated games.
InformationWeek (December 3, 2010)

IBM Bolsters Secure Development Tools
Rational AppScan improvements meant to help developers code more secure applications and sidestep web-based vulnerabilities.
InformationWeek (December 3, 2010)

FBI Busts Alleged Mega D Botnet Mastermind
Russian citizen Oleg Nilolaenko, arrested at a Las Vegas automotive show last month, is charged with operating botnet that in its heyday generated one-third of the world's spam.
InformationWeek (December 2, 2010)

China Struggling To Combat Hackers
Ministry of Public Security said it's seen an 80% annual increase in hacking cases since 2006.
InformationWeek (December 2, 2010)

November 2010

Windows Phone 7 Modified To Run Custom Apps
ChevronWP7 eliminates the need for a $99 annual Microsoft developer registration, but critics argue the tool will increase application piracy.
InformationWeek (November 30, 2010)

Trend Micro To Buy Encryption Firm Mobile Armor
Acquisition of hardware and software endpoint encryption company is latest in a busy year of purchases involving major security vendors.
InformationWeek (November 30, 2010)

Android Vulnerable To Data Theft Exploit
Google is preparing a fix for the bug that could allow attackers to use JavaScript to read files from handsets.
InformationWeek (November 29, 2010)

Zero Day Bug Bypasses Windows User Account Control
Local buffer overflow vulnerability tricks Microsoft operating systems into granting an attacker system-level user privileges.
InformationWeek (November 29, 2010)

Schwartz On Security: China's Internet Hijacking Misread
Core Internet security concerns aren't as sexy as hyping Chinese attacks, but concern over the potential assault is misplaced and distracts from the need to fix what's really broken.
InformationWeek (November 24, 2010)

Most Microsoft DLL Hijacking Vulnerabilities Remain Unpatched
Three months after they were first disclosed, only 15% of known bugs have been patched, reports ACROS Security.
InformationWeek (November 24, 2010)

Consumers Ignore Safe Online Shopping Guidance
Webroot survey finds that 52% of people don't check for an HTTPS connection before making purchases and 23% feel safe when using free, public wireless connections for e-commerce.
InformationWeek (November 24, 2010)

Apple iOS 4.2 Includes 40 Security Fixes
More than half of the patches relate to the Webkit open source web browser engine.
InformationWeek (November 23, 2010)

Enterprises Overlook Virtualization, Cloud In Disaster Recovery
Symantec study finds 44% of data on virtualized systems is rarely backed up, and 60% of virtualized servers are not included in disaster recovery plans.
InformationWeek (November 23, 2010)

Federal Reserve Hacker Indicted
Lin Mun Poo of Malaysia is accused of possessing more than 400,000 stolen credit and debit card numbers.
InformationWeek (November 22, 2010)

Alureon Malware Bites Windows 7
The threat's rootkit gets an upgrade to compromise Microsoft's 64-bit operating systems by defeating driver-signing security.
InformationWeek (November 22, 2010)

CIOs See Smartphones As Data Breach Time Bomb
Nearly half of employees can use their personal devices to connect to enterprise networks despite security risks, finds Ovum study.
InformationWeek (November 19, 2010)

Hacker Cracks Secure Hashing Algorithm Using Amazon Cloud
Using EC2's cluster GPU power, security researcher spent only $2.10 to decrypt 14 SHA1 passwords in under an hour; other experts aren't concerned.
InformationWeek (November 19, 2010)

White Hat Hacker Cracks ZeroAccess Rootkit
Analysis may help security firms develop better botnet defenses.
InformationWeek (November 18, 2010)

Researchers Link Most Spam To Only 50 ISPs
Discovery that spammers are using only a relative handful of Internet providers suggests new ways of stopping botnets.
InformationWeek (November 18, 2010)

Schwartz On Security: Click 'Dislike' For Facebook Safety
Facebook's Customers: Advertisers, Not Users
InformationWeek (November 18, 2010)

Cisco Sees Jump In Java Attacks
About 10% of malware encounters come through search engines, with Google leading the list.
InformationWeek (November 17, 2010)

Cloud Consortium Releases Security Compliance Tools
Free governance, risk management, and compliance stack from the Cloud Security Alliance aims for data-handling and security transparency.
InformationWeek (November 17, 2010)

Symantec Finds Stuxnet Targets Iranian Nuclear Enrichment
Researchers report that the industrial control system malware is aimed at hindering Iran's efforts to convert uranium into atomic bomb-grade fuel.
InformationWeek (November 16, 2010)

Downtime Rated Top Risk Of Data Breaches
Solera Networks survey also finds a drop in the number of organizations that have a security incident response plan in place.
InformationWeek (November 16, 2010)

Fake Angry Birds App Exposes Android Vulnerability
Flaw bypasses a security control, allowing an application to silently download and grant complete access rights to additional apps.
InformationWeek (November 15, 2010)

Researchers Down Koobface Botnet
Three of the malware's command-and-control servers were taken offline, hindering its click-fraud network.
InformationWeek (November 15, 2010)

Java Users Urged To Patch
Security researcher Daniel Wesemann says Java exploits are at an all-time high and just as dangerous as other malware.
InformationWeek (November 12, 2010)

Spam Trips Symantec Hosted Services
Anti-spam service SORBS blacklisted Symantec's hosted email service after Symantec customer's webmail was hacked by spammer.
InformationWeek (November 12, 2010)

Spam Down 47% After Botnet Busts
Still, spam made up 86.6% of all messages in October and automated toolkits increased the prevalence of phishing threats, reported Symantec.
InformationWeek (November 11, 2010)

Apple OS X 10.6.5 Patches 131 Security Flaws
About 40% of the fixes involve Adobe Flash, lending some credence to Apple's criticism of the plug-in.
InformationWeek (November 11, 2010)

Microsoft Patches DLL Hijacking Vulnerability
One of the bugs could hijack a PC if a user simply previewed an email with a malicious Word, Excel, or PowerPoint file attached.
InformationWeek (November 10, 2010)

Hackers Hijack 1 Million China Cell Phones
Zombie text sending malware is racking up $300,000 in charges per day.
InformationWeek (November 10, 2010)

Schwartz On Security: Reaching The M&A Tipping Point
The jury is out on whether businesses will benefit from Intel buying McAfee or from Symantec, IBM and Microsoft sucking up everything in sight.
InformationWeek (November 10, 2010)

Tools Gut Firesheep Cookie Hijacking Attack
BlackSheep, FireShepherd, and HTTPS Everywhere released to block controversial Firefox plug-in.
InformationWeek (November 9, 2010)

Zero Day Vulnerability Hits Adobe
Bug could allow an attacker to trick an Acrobat user into opening a "specially crafted" PDF file; Adobe plans to release fix next week.
InformationWeek (November 9, 2010)

FBI Seeks Victims Of Cyber 'Sextortion'
Hacker surreptitiously installed malware to access webcams and explicit images stored on the PCs of adolescent girls.
InformationWeek (November 8, 2010)

Hacker Sinks Royal Navy Website
SQL injection attack used to break in and lift administrator credentials, databases from the government site.
InformationWeek (November 8, 2010)

Android Vulnerable To Drive-By Attack
Security researcher details code to remotely exploit the browser in Android OS 2.1 or earlier.
InformationWeek (November 5, 2010)

Vulnerabilities Found In Banking Apps
Security holes in Android and iPhone apps from PayPal, Bank of America, Chase, Wells Fargo, and more could give attackers access to financial data.
InformationWeek (November 5, 2010)

UniBrows Adds Security To Internet Explorer 6 Apps
Startup Browsium could help eliminate security concerns for firms that don't have the budget to update their IE6-based apps or intranets for safer browsers.
InformationWeek (November 4, 2010)

Viruses Lead SMB Security Concerns
Malware tops employee-generated data breaches among security concerns of small and midsize business, finds Trend Micro survey.
InformationWeek (November 4, 2010)

Schwartz On Security: Remove Dangerous Sites From Internet
Should domain name registrars and businesses with compromised, malware-spewing websites be dropped from the Internet?
InformationWeek (November 4, 2010)

Former IT Director Imprisoned For Hacking Employer's Servers
Darnell Albert-El gets 27-month sentence for deleting files at Transmarx as revenge for being terminated.
InformationWeek (November 3, 2010)

Americans See PCs As Safer Than Mobile Devices
Study by National Cyber Security Alliance and Symantec's Norton also finds that four out of five people don't sufficiently protect their systems from attack, producing a false sense of security.
InformationWeek (November 3, 2010)

October 2010

Bredolab Botnet Still Spewing Malware
Days after Dutch authorities disabled 143 command and control servers, security researchers are seeing new signs of life.
InformationWeek (October 29, 2010)

Adobe Acknowledges Active Flash Exploit
Zero-day bug, which won't be patched for two weeks, is being delivered in a malicious PDF targeted toward job seekers.
InformationWeek (October 29, 2010)

Banks Weak Against Credit Card Skimming Attacks
Gartner warns that anti-skimming standards and technologies aren't keeping up with recent spate of attacks, which can quickly net individual gangs $500,000 a month.
InformationWeek (October 28, 2010)

Microsoft Windows Still Vulnerable To DLL Hijacking
Even patched applications aren't safe from bug, says ACROS security researcher.
InformationWeek (October 28, 2010)

Schwartz On Security: Zombie Internet 'Kill Switch'
Surgically disabling crucial parts of the Internet is folly, our columnist argues, no matter the powers supposedly bestowed by legislators.
InformationWeek (October 28, 2010)

Iranian Cyber Army Joins Botnet Business
Up to 20 million machines may be infected by malware network, which may be backed by Iranian authorities, finds Seculert.
InformationWeek (October 27, 2010)

Americans Maximize Social Network Security
The U.S. leads the world in restricting the personal information that people can access on their Facebook, Twitter, and other pages, reports Unisys study.
InformationWeek (October 27, 2010)

Apple Won't Push Flash Player Updates
Flash updates will no longer arrive with Apple security updates, and new MacBook Air arrives without Flash installed, one week after the company distanced itself from Java.
InformationWeek (October 27, 2010)

Bredolab Botnet Busted
The Dutch High Tech Crime Team has seized 143 servers used to infect an estimated 30 million computers and arrested the alleged mastermind behind the botnet.
InformationWeek (October 27, 2010)

Enter the Scrum
From development chaos to agility and control
Dice (October 26, 2010)

Workers Abusing Social Sites On Corporate Networks
Employees' use of Facebook, Gmail, Hotmail and BitTorrent is posing security risks, according to study by Palo Alto Networks.
InformationWeek (October 25, 2010)

Businesses Hazy On Security Of Cloud Applications
Nearly two-thirds of organizations don't have a complete picture of what resources their employees are accessing, finds a Courion survey.
InformationWeek
(October 25, 2010)

IBM Targets Cloud Computing With Security Infrastructure, Services
Seeking to allay widespread fear of data breaches, IBM introduces security assessments, SaaS offerings and hosted vulnerability management.
InformationWeek (October 22, 2010)

Microsoft Warns Java Exploits Hit 'Unprecedented Wave'
With more than 6 million attacks on vulnerable code in the third quarter, Microsoft is urged to distribute a patch.
InformationWeek (October 22, 2010)

Cloud Security To Reap $1.5 Billion By 2015
Market demand for secure clouds is expanding aside IT's overall shift into off-premises models, says Forrester.
InformationWeek (October 22, 2010)

Schwartz On Security: Can Apple Minimalism Stop Botnets?
Why applying Steve Jobs' iPhone "walled garden" model to limit what PCs can do makes sense for combating cybercriminals.
InformationWeek (October 21, 2010)

Malware Winning Battle Against Antivirus Software
Security apps' threat-stopping ability declined 6% over the past year as threats gained sophistication, finds NSS Labs.
InformationWeek (October 20, 2010)

Stonesoft Warns Of Complex Hacking Technique Vulnerability
Intrusion detection and prevention systems are subject to exploitation by attackers employing multiple simultaneous evasion methods, cautions the Finnish security firm.
InformationWeek (October 19, 2010)

Electronic Theft Costs Businesses More Than Physical Theft
Phishing is the top information theft threat to U.S. companies, according to a Kroll survey that found physical property fall behind information thievery for the first time in its four-year history.
InformationWeek (October 19, 2010)

Phishing Attacks Rise Sharply But Spam Emails Decline
Automated botnet toolkits drive website security breaches, with social networks hit hard, Symantec report reveals.
InformationWeek (October 15, 2010)

Credit Card Users Prefer Fingerprints To Validate ID
Unisys poll shows consumers think the biometric method is more secure than photo identification, PIN numbers or handwritten signatures.
InformationWeek (October 15, 2010)

Smart Grids Offer Cyber Attack Opportunities
Hackers are likely to exploit the 440 million potential targets researchers predict smart grids will offer by 2015.
InformationWeek (October 12, 2010)

Cyber Threats Forecast For 2011
Botnets and attacks on pervasive devices and social networks rank among the biggest information security threats expected next year, according to the Georgia Tech Information Security Center.
InformationWeek (October 12, 2010)

Drive-By Malware Blocked By New Tool
BLADE stops malicious websites from performing so-called drive-by-downloads, but can't block social engineering attacks.
InformationWeek (October 8, 2010)

Feds Bust Akamai Insider
Court documents said officials from a foreign government contacted FBI after Akamai finance worker offered to trade secrets.
InformationWeek (October 8, 2010)

Critical Infrastructure Providers Face Politically Motivated Attacks
A Symantec survey finds that half of critical infrastructure providers have experienced politically motivated attacks against their networks.
InformationWeek (October 7, 2010)

Fannie Mae Insider Convicted For Planting Malware
Former Unix engineer inserted malicious script designed to destroy data at the financial services firm, finds federal jury.
InformationWeek (October 7, 2010)

Credit Industry Pitches Card Encryption
The Payment Card Industry council has released new guidance on security standards.
InformationWeek (October 7, 2010)

Cisco Boosts Borderless Network Architecture, Security
Debuts high-performance switching, routing security, and wireless networking appliances, as well as an entry-level 802.11n wireless access point.
InformationWeek (October 6, 2010)

Apple iTunes Used In Massive Phishing Attack
Emails with fake e-commerce receipts trick users into installing Zeus financial malware, giving up credit card details.
InformationWeek (October 5, 2010)

Novell Finds Widespread Concern About Cloud Security
Even so, adoption of public and private cloud computing is higher than anticipated and will continue to grow, finds survey.
InformationWeek (October 5, 2010)

Zeus Cybercrime Sting Produces Ukrainian Arrests
Alleged ringleaders of the financial malware botnet were responsible for stealing $70 million from individuals' bank accounts, said the FBI.
InformationWeek (October 4, 2010)

Financial Data Breaches Linked To Poor Security Compliance
Verizon finds organizations suffering losses are 50% less likely to have Payment Card Industry Data Security Standards compliance.
InformationWeek (October 4, 2010)

IstanbulIstanbul in 5...
Istanbul, a Turkish port city on the Bosporus, has long been celebrated as a place where east meets west. Geographically, at least, that’s true, since the bicoastal city spans two European coasts and one in Asia, with each offering something different.
Fox News (October 4, 2010)

NitroSecurity Intros Security Monitoring For Critical Infrastructure
In the wake of Stuxnet, tool adds control system data to real-time security information and event monitoring.
InformationWeek (October 1, 2010)

Feds Bust Zeus Financial Cybercrime Ring
Group allegedly swindled $3 million using malware, botnets, and "money mules."
InformationWeek (October 1, 2010)

September 2010

IE, Windows XP Users Vulnerable To DLL Hijacking
Clicking a link to a remote shared folder on a web page will open this share in Windows Explorer without a warning for 67% of all Internet Explorer users on Windows XP, according to Acros Security.
InformationWeek (September 30, 2010)

Android Apps Disclose More Than Users Know
Half of applications studied share location information and unique identifiers with advertisers, many without disclosing this to users.
InformationWeek (September 30, 2010)

LinkedIn Attack Spreads Zeus Financial Malware
Infection related emails accounted for almost 25% of the world's spam at its peak Monday.
InformationWeek (September 29, 2010)

Microsoft Beefs Up Hotmail Security
Raft of new features aimed at blocking email hijackers and helping users reclaim compromised accounts.
InformationWeek (September 29, 2010)

Google Embraces OAuth Authentication For Apps
Adoption parallels security moves at other sites, including Twitter, Salesforce.com, and Microsoft Azure.
InformationWeek (September 28, 2010)

Twitter Halts Vulgar Malware Attack
Offensive tweets about goats hijacked user accounts using cross-site request forgery.
InformationWeek (September 28, 2010)

Q1 Labs Releases SIEM For Social Media
QRadar 7.0 uses deep packet inspection technology for real-time monitoring of web-based malware and extends Security Information and Event Management to social media usage.
InformationWeek (September 28, 2010)

Anti Piracy Law Firm Emails Leaked Via BitTorrent
Piracy activists posted an internal email database of anti-piracy legal firm ACS:Law to The Pirate Bay.
InformationWeek (September 28, 2010)

Spammers Transferring Operations To Russia
Following China's security clampdown, Russian registrars have seen a rise in spam-related domain registrations.
InformationWeek (September 22, 2010)

Mobile Workforce Poses Increasing Security Threat
New report from Symantec finds that surveillance does alter behavior, with workers being 35% more likely to run afoul of corporate surfing policies when they're mobile, rather than in the office.
InformationWeek (September 22, 2010)

Accuvant Acquires Cybersecurity Firm Ciphent
Purchase by security consulting firm aims to grab a share of increased spending by federal agencies.
InformationWeek (September 21, 2010)

Stuxnet Updates Through P2P Communications
Symantec finds that peer-to-peer networks can propagate the malware, even though its command and control systems are now offline.
InformationWeek (September 20, 2010)

Adobe Accelerates Fix For Flash Flaw
Repair for the critical vulnerability, which is being actively exploited, will be released Monday rather than later this month.
InformationWeek (September 20, 2010)

Adobe Cautions Users Against Installing Unofficial Security Patches
RamzAfzar has issued a homemade patch for the CoolType.dll zero-day vulnerability in Adobe Acrobat and Adobe Reader, but Adobe is urging users to wait for the official patch due October 4.
InformationWeek (September 17, 2010)

Security Exploits Increasingly Complex
A study from HP TippingPoint finds that web applications are still an attack magnet, but hackers now appear to be collaborating more closely to spot new flaws.
InformationWeek (September 17, 2010)

Google Fires Engineer For Spying On Users
Staffer accused of accessing four minors' private Gmail and GTalk accounts.
InformationWeek (September 15, 2010)

Software Piracy Tracker Integrates With Salesforce.com
CodeArmor Intelligence 3 helps app vendors collect licensing fees by linking sales staff with non-paying organizations.
InformationWeek (September 15, 2010)

Forrester Predicts Wave Of Security Acquisitions To Continue
Big players -- Symantec, Microsoft, IBM, Oracle -- still have full coffers and their eyes on smaller market leaders, even after a year full of deals.
InformationWeek (September 14, 2010)

Social Networks Pose Security Risks To SMBs
Fewer than half of small and midsize businesses actively enforce social network security policies, finds Panda Security.
InformationWeek (September 14, 2010)

Cisco Pinpoints 'Here You Have' Worm's Virulence
E-jihadist group claims responsibility for attack, which spread rapidly through poor enterprise webmail filters, open network shares.
InformationWeek (September 14, 2010)

RFID Tags' Range Boosted By Ductwork
Using building HVAC ducts can triple the range of wireless RFID tags, creating new possibilities for climate control, health and safety, security and other monitoring applications.
InformationWeek (September 14, 2010)

Android SMS Trojan Uses SEO To Spread
Disguised as an adult media player, the malware sends $6 text messages until a user's mobile phone account runs out of credit.
InformationWeek (September 10, 2010)

'Here You Have It' Worm Strikes Email Inboxes
Using a Windows screensaver file containing malicious code, the mass-mailing worm can disable some antivirus programs and move via email and local networks.
InformationWeek (September 10, 2010)

Adobe Acrobat, Reader Under Attack From Zero-Day Exploit
Turning off JavaScript in Adobe Reader advised to protect against the critical vulnerability.
InformationWeek (September 9, 2010)

Twitter Patches Account Hijacking Vulnerability
Easy-to-exploit, one-click attack caught more than 100,000 users; additional variations may still be at large.
InformationWeek (September 8, 2010)

Quantum Cryptography Breached With Lasers
Using lasers to blind quantum cryptography photon detectors, Norwegian computer scientist were able to obtain a copy of a secure key without leaving any trace of their presence.
InformationWeek (September 8, 2010)

Adult Content Producers Take On BitTorrent Traders
Mass litigation lawsuits target people who allegedly pirated copyrighted movies through the peer-to-peer network.
InformationWeek (September 7, 2010)

Microsoft Warns Of Malware Faking Virus Alerts
New scareware known as Rogue:MSIL/Zeven uses a social-engineering attack to sucker users into buying a fake antivirus program.
InformationWeek (September 7, 2010)

August 2010

Pushdo Botnet Crippled Via Coordinated Takedown
Security researchers have pushed large parts of the spam maker offline, but it may not decrease overall crimeware levels.
InformationWeek (August 28, 2010)

IT Security Unleashes Employee Complaints
Protecting enterprise data and systems while maintaining employee productivity is a delicate balance for CIOs, finds Robert Half survey.
InformationWeek (August 28, 2010)

Google Fixes Gmail Bug That Kept Sending Emails
Emails were being dispatched to the same recipients, sometimes multiple times per day, even when deleted from Gmail, resulting in spam warnings and blacklisting.
InformationWeek (August 27, 2010)

25% Of Malware Spread Via USB Drives
Email and peer-to-peer networks also rank as significant venues for malware attacks, which have increased slightly in the U.S. but declined in Europe, according to Panda Security.
InformationWeek (August 27, 2010)

Massive 'Fake AV' Attack Launched
Scareware campaign targets consumers' credit card information with bogus offers of free antivirus services, warns Sophos.
InformationWeek (August 26, 2010)

Skeletal Scans Explored For Crime Fighting
Add biometrics of people's bone structures to the list of methods considered for identifying terrorists, criminals, or trusted individuals.
InformationWeek (August 26, 2010)

Novell Releases Cloud Security Service
Enforces access control and relays activity and compliance monitoring to identity management systems.
InformationWeek (August 25, 2010)

Vulnerability Disclosures Increase By 36% In 2010
IBM report finds "escape to hypervisor" attacks a growing virtualization concern.
InformationWeek (August 25, 2010)

Facebook Spam Conversion Rate Hits 47%
Return rate far exceeds e-mail, but people are starting to develop a resistance to clicking on Facebook and Twitter virally spreading links, finds F-Secure.
InformationWeek (August 24, 2010)

Microsoft Confirms Windows DLL Hijacking Vulnerabilities
Proof-of-concept code for the remote execution attack hits the wild; numerous applications at risk.
InformationWeek (August 24, 2010)

Adobe Patches Zero Day Vulnerabilities
Out-of-cycle updates fix bugs in Reader and Acrobat affecting Windows, Mac, and Unix.
InformationWeek (August 23, 2010)

Malware Contributed To Plane Crash
Investigation into Spanair flight 5022 finds that monitoring server had been disabled by Trojan application.
InformationWeek (August 23, 2010)

Cameron Diaz Is The Web's Most Dangerous Celebrity
New McAfee report investigates the most trendy noteables for cyber attacks, finds Barack Obama and Sarah Palin are among the safest.
InformationWeek (August 19, 2010)

Scareware Tricks Users Into Removing Antivirus Software
Version of the widespread "retrovirus" CoreGuard Antivirus, called AnVi Antivirus, aims for many well-known AV programs, warns Symantec.
InformationWeek (August 19, 2010)

Scareware Using Bing Results To Expand Attack
Mass rogue antivirus campaign tricking search engines to return malicious links using results from Microsoft's search engine.
InformationWeek (August 18, 2010)

Malware Spewing Widget Hacks 500,000 Websites
Security expert estimates that up to 5 million domains parked by Network Solutions are actively serving threats.
InformationWeek (August 17, 2010)

Spyware Hidden In Android Snake Tap Game
Free app is paired with GPS Spy, software that monitors a targeted device's location.
InformationWeek (August 17, 2010)

Passwords Quickly Hacked With PC Graphics Cards
Georgia Tech researchers find that high-end, readily available graphics processing units are powerful enough to easily crack secret codes.
InformationWeek (August 16, 2010)

Botnet Operator Comes Clean About Casino Scam
Busted GhostMarket.net member posted on an underground forum how he stole nearly $30,000 with credit card fraud.
InformationWeek (August 16, 2010)

Americans Expect Emergency Responders To Monitor Social Media
Red Cross finds that in a disaster many people would post cries for help on Facebook and Twitter, assuming they'd be answered.
InformationWeek (August 13, 2010)

Anti-Malware Gives Biggest Bang For Security Buck
Antivirus software, firewalls and having a CISO also deliver high returns, finds the Ponemon Institute.
InformationWeek (August 13, 2010)

Symantec Finds 92% Of All E-Mail Is Spam
Report also says phishing is down despite the rise of a new Live-Chat based attack that tries to trick people into giving up personal details.
InformationWeek (August 12, 2010)

Hackers Deflate Auto Tire-Pressure Sensors
Monitors in fast-moving cars can be damaged using spoofed wireless signals, leading to security, privacy, and safety threats.
InformationWeek (August 12, 2010)

Guidance Intros Forensics For Live Control Systems
Determines whether system failures are due to cyber attacks or benign problems, without taking mission-critical infrastructure offline.
InformationWeek (August 11, 2010)

Touchscreen Smudges Pose Security Risk
Residual fingerprint oils on smartphones, ATMs, and other devices may reveal passwords and other confidential data, find security researchers.
InformationWeek (August 11, 2010)

Green IT Making a Comeback
You may remember green IT, which made a big splash a few years back: Reduce carbon footprints, minimize energy consumption, rethink architecture, help the environment. Then the worst economic recession since the Great Depression threw everyone off of their game. Now, green may be making a comeback.
Dice (August 10, 2010)

McAfee Says Security Industry Failing On Cybercrime
Report outlines proactive, offense-based strategy needed to battle increasingly sophisticated threats.
InformationWeek (August 10, 2010)

Microsoft Investigating Color Management Bug In Windows 7
Vulnerability could provide an attacker with kernel-level access, but Microsoft's Patch Tuesday won't have a fix.
InformationWeek (August 10, 2010)

Web Browser Privacy Settings Flawed
Private and anonymous settings in Firefox, Internet Explorer, and others can expose more details than users expect, security researchers find.
InformationWeek (August 9, 2010)

Estonian Bank Hacker Extradited To U.S.
Sergei Tsurikov charged with masterminding sophisticated, $9 million computer fraud of RBS Worldpay system.
InformationWeek (August 9, 2010)

SonicWall Names Top 2010 Cybercrime Threats
Web-based attacks and threats to corporate cloud computing spiked spiked dramatically in the first half of 2010 according to a report from the firewall vendor.
InformationWeek (August 6, 2010)

Microsoft Previews Record-Setting Patch Tuesday
Redmond is expected to release 14 bulletins, addressing 34 vulnerabilities across Windows, Office, IE, SQL and Silverlight.
InformationWeek (August 6, 2010)

Most IT Pros Circumvent File Transfer Security Policies
Survey finds 69% of IT managers regularly send highly sensitive information -- payroll, customer, or financial data -- via unsecured e-mail, finds Ipswitch study
InformationWeek (August 5, 2010)

Data Retention Policies Absent Or Partially Implemented
Almost 90% of IT and legal pros value data retention plans, but less than half their organization have them and many fail to follow through with required technology, finds Applied Research survey.
InformationWeek (August 5, 2010)

Advocates Propose Child ID Theft Prevention Database
Database, to be shared with credit reporting agencies, would verify if a social security number belongs to a minor.
InformationWeek (August 4, 2010)

Security Specialists Support Cyberwarfare
Two-thirds of information security aficionados back government-promulgated online spying, hacking, or surreptitious malware installs, finds Sophos.
InformationWeek (August 3, 2010)

Microsoft Patches Windows Shell Vulnerability
With the out-of-band release, Microsoft also disclosed Office documents at risk from the "no user input required" shortcut icon attack.
InformationWeek (August 3, 2010)

IT Admins Say Web 2.0 Undermines Enterprise Security
Spending on Internet security technology lags perceived risk, finds Check Point-sponsored study from Ponemon Institute.
InformationWeek (August 2, 2010)

UK Government Stays With IE6
Experts say Microsoft Internet Explorer 6 is a security risk and should be replaced with newer browser.
InformationWeek (August 2, 2010)

July 2010

Snort Creator Slams Open Source IDS Suricata
Martin Roesch expressed disappointment with the Open Information Security Foundation's efforts, and touted Razorback, Sourcefire's open source analysis and detection engine, as truly innovative.
InformationWeek (July 30, 2010)

Symantec Revenue Flat, McAfee Profits Up 4%
TenCube, developer of the WaveSecure mobile security service platform, will be acquired by McAfee, the company announced, to broaden its security capabilities.
InformationWeek (July 30, 2010)

Plants versus ZombiesHow to Score a Job in Mobile Gaming
Want to break into mobile games? (Screenshot at right: Plants versus Zombies on an iPad.)
Dice (July 29, 2010)

Oracle Patches Bug Crashing Eclipse
Changing the company field name from Sun to Oracle in latest Java update caused the Eclipse software development environment to fail.
InformationWeek (July 29, 2010)

Mariposa Botnet Creator Arrested
Developer of the malware, used to create almost 10,000 unique pieces of malicious software, was busted in Slovenia.
InformationWeek (July 29, 2010)

WikiLeaks Tests Feasibility Of Government Data Security
Governments will always face the twin challenges of balancing the need for secrecy with the need to collaborate, say experts.
InformationWeek (July 28, 2010)

Security Pros See Cloud As Top Risk
Fewer than 2% have seen serious incidents caused by employee mobile device or social network use, finds RSA survey.
InformationWeek (July 28, 2010)

Sophos Blocks Windows Shell Attacks
Malware protection tool doesn't blank out shortcut icons like Microsoft's proposed workaround for the active exploit.
InformationWeek (July 27, 2010)

Scientists Reveal Location Based Cryptography
Quantum mechanics used to encrypt and decrypt data at a secure location without pre-sharing any cryptographic keys.
InformationWeek (July 27, 2010)

Zeus Malware Anti Piracy Measures Thwarts Competitors, Researchers
Zbot financial malware only works when executed on one specific machine and from one specific path, similar to hardware-based licensing systems employed by major software companies.
InformationWeek (July 26, 2010)

Mobile Security, Privacy Concerns Decreasing
U.S. consumers remain reluctant to conduct financial transactions on their phones, finds KPMG survey.
InformationWeek (July 26, 2010)

Windows Shell Attacks Increase
Microsoft and Siemens released tools to combat the zero-day exploits which autorun malicious code from USB drives.
InformationWeek (July 23, 2010)

Imperva Identifies Cloud Based Phishing Kit
Cybercriminals can create attacks spoofing 16 sites, including Facebook, RapidShare and Skype, using the next-generation phishing toolkit.
InformationWeek (July 23, 2010)

Employees Influencing Enterprise IT
Demand for consumer-oriented devices in the workplace causing IT leaders to rethink how they procure and secure technology, a new survey finds.
InformationWeek (July 22, 2010)

Dell Shipped Malware Infected Motherboards
W32.Spybot worm discovered in flash memory on some replacement PowerEdge server motherboards.
InformationWeek (July 22, 2010)

McAfee Releases Mac Security Tools
Internet Security and Family Protection for Apple Mac aimed at making Web browsing safer.
InformationWeek (July 21, 2010)

Cybersecurity Expert Shortage Puts U.S. At Risk
Presidential commission proposes overhauling certifications to increase cybersecurity professional quality and quantity.
InformationWeek (July 21, 2010)

IBM Adds Web App Firewall To IPS Appliances
The 4.1 firmware release for the Security Network Intrusion Prevention System line of appliances includes client-side application protection, data security, web application protection and application control.
InformationWeek (July 16, 2010)

Malware Spreading Via USB Drives
The Stuxnet rootkit launches even with AutoRun and AutoPlay disabled and is known to affect Windows 7 Enterprise Edition x86 operating systems.
InformationWeek (July 16, 2010)

Mozilla Disables Firefox Add-On, Recommends Upgrade
The disabled Mozilla Sniffer was intercepting login data and transmitting it to a third-party website; upgrading to the latest version of the CoolPreviews add-on is recommended due to security vulnerability.
InformationWeek (July 15, 2010)

McAfee Launches Identity Theft Protection Service
The subscription service includes daily monitoring of the three major credit-reporting agencies, public records, Internet scanning and suspicious activity alerts.
InformationWeek (July 15, 2010)

US Extends Spam Lead
Twice as much spam comes from the United States as any other country in the world, finds Sophos.
InformationWeek (July 14, 2010)

Cybercrime Threats Gaining Complexity
As current attacks become less effective, there's a corresponding increase in more difficult-to-detect combined attacks, finds M86 study.
InformationWeek (July 14, 2010)

Oracle Patches 59 Vulnerabilities
Sun Solaris product suite, Oracle Database Server, Fusion Middleware, and Supply Chain Products Suite vulnerable to remote exploitation, with no authentication required.
InformationWeek (July 13, 2010)

Social Networking Weakens Enterprise Security
Trend Micro survey finds 24% of employees access social networks from their business computers.
InformationWeek (July 13, 2010)

Microsoft Ends Support For Windows XP SP2
Almost half of all PCs still run the operating system, which could leave organizations exposed to new malware, with no way of patching the vulnerabilities.
InformationWeek (July 13, 2010)

Microsoft Reveals Source Code To Russia
Government Security Program allows access to software code to facilitate development of secure national computing infrastructures.
InformationWeek (July 12, 2010)

Phishing, Spam Containing Malware Increase
Spammers seeking to rebuild botnets after legal actions shut down several zombie networks are driving a surge in malware-containing spam according toe Symantec.
InformationWeek (July 9, 2010)

ID Thefts Go Unreported Despite Notification Laws
The Identity Theft Resource Center says one-third of breaches appear to be malicious, but a lack of transparency and accountability may be masking true extent of problem.
InformationWeek (July 9, 2010)

NIST Updates Federal Cybersecurity Guidelines
National Institute for Standards and Technology simplified security assessment and control procedures to focus on near-real-time risk management.
InformationWeek (July 8, 2010)

Firewall Market To Grow 6.7% Annually
An emerging fourth generation of products will propel the uptick through 2016, finds Frost & Sullivan.
InformationWeek (July 8, 2010)

Internal Sabotage Security Risks Rising
Snooping by IT administrators is also increasing, according to a survey from Cyber-Ark Software.
InformationWeek (July 7, 2010)

Microsoft Challenged By Security Researchers
Group dubbed Microsoft-Spurned Researcher Collective promises open and free disclosure of vulnerability information.
InformationWeek (July 7, 2010)

McAfee Signs Deal To Secure USB Drives
Two thirds of worldwide USB manufacturers have agreed to ship McAfee security software on their devices to guard against malware.
InformationWeek (July 7, 2010)

Beach on ZdrilcaCroatian Beaches in 5...
Never mind that the beaches are mostly made of pebbles and rocks, Croatia’s islands, off the coast of Dalmatia, make for a singular beach getaway that won’t wreck your budget.
Fox News (July 6, 2010)

Botnet Viruses Target Symbian Smartphones
Nokia, Samsung and Sony Ericsson smartphones are among those running the two Symbian operating systems vulnerable to attack according to NetQin.
InformationWeek (July 6, 2010)

June 2010

Security Managers Report Weak Threat Defenses
Many organizations don't realize when they're being hit by zero-day and other advanced attacks, and they aren't responding effectively either, the Ponemon Institute reports.
InformationWeek (June 29, 2010)

Novell Releases Log Management Software Appliance
Sentinel Log Manager records events from physical, virtual, and cloud environments, either as a virtual appliance or loaded on dedicated hardware.
InformationWeek (June 29, 2010)

Social Network Security Policies Lacking
Symantec survey finds half of social networking at work is for business purposes, but many organizations don't have appropriate security policies or enforcement.
InformationWeek (June 28, 2010)

Network Security Threats Increasing
IT managers say mounting vulnerabilities combined with insufficient budgeting and staffing put their organizations at risk.
InformationWeek (June 25, 2010)

Comodo Warns Of VeriSign SSL Vulnerability
VeriSign said the supposed certificate request flaw is actually a feature and accused Comodo of not following standard vulnerability disclosure guidelines.
InformationWeek (June 25, 2010)

White House Preparing National Online ID Plan
The proposed system for authenticating people, organizations and infrastructure on the web at the transactional level will require an identity ecosystem.
InformationWeek (June 25, 2010)

V.i. Labs Launches SaaS Software Piracy Tool
For small and midsize independent software vendors, CodeArmor Software Intelligence Online collects usage data and tracks unlicensed copies.
InformationWeek (June 25, 2010)

Palo Alto Introduces Security For Cloud, Mobile Users
GlobalProtect applies firewall policies to users when they use PCs, mobile devices and in the cloud.
InformationWeek (June 22, 2010)

Teens Engage In Risky Online Behavior
McAfee study finds teenagers often share personal information, including their name, location, or cell phone number, with strangers.
InformationWeek (June 22, 2010)

Trend Micro Announces Hybrid SaaS Email Security
The InterScan Messaging Security Virtual Appliance combines a virtual appliance with SaaS-based inbound email security.
InformationWeek (June 22, 2010)

Symantec SMB Study Shows Security Concerns Rising
SMBs rank information loss and online attacks as their leading worries with more than 40% losing data in the past year and more than 70% victimized by cyberattacks.
InformationWeek (June 22, 2010)

Apple Increases Mac OS X Malware Protection
Defenses against the HellRTS Trojan were included -- but not documented -- in the Mac OS X 10.6.4 update this week.
InformationWeek (June 18, 2010)

Internet Fraud Alert Program Launched
Microsoft, FTC, PayPal back program for sharing information on compromised account credentials.
InformationWeek (June 18, 2010)

More Firms Outsourcing Security To MSSPs
Managed security service provider market is expected to reach $3.9 billion in 2016 because of increased attacks and economic pressures.
InformationWeek (June 17, 2010)

Social Networks Pose E-Discovery Risks
Growing corporate use of Twitter, Facebook, and cloud-based applications are creating new e-discovery demands, but c-level awareness of risks remains scarce.
InformationWeek (June 17, 2010)

Juniper Releases SSL VPN Client For Mobile Devices
Enterprise networks gain secure connections with laptops, netbooks, and mobile devices including Windows Mobile, Symbian, and iPhone 4G.
InformationWeek (June 16, 2010)

Corporate Boards Weak On Security, But Improving
Study finds more than half of Fortune 1000 companies lack a CISO, but the number of organizations with cross-functional teams for managing security and privacy is up significantly.
InformationWeek (June 16, 2010)

Symantec Releases Norton Family Monitoring Software
The free service is meant to block inappropriate Web sites and monitor kids' social networking habits.
InformationWeek (June 15, 2010)

Facebook Hit With Clickjacking Attack
The social network is not doing enough to stop the worms, Sophos poll reveals.
InformationWeek (June 15, 2010)

SQL Injection Attacks Return
The malicious iFrame attack infected 1,000 web pages by exploiting vulnerabilities in web applications.
InformationWeek (June 15, 2010)

Sophos Releases iPhone Security News App
Free application features quick, graphical look at the top viruses, spam, and malware in circulation.
InformationWeek (June 14, 2010)

World Cup IT Security Follows Swiss Rules
Mahindra Satyam, the soccer tournament's official IT services provider, is responsible for safeguarding 160,000 users, the distribution of 3 million tickets, and 40 terabytes of data.
InformationWeek (June 11, 2010)

Microsoft Security Vulnerability Disclosed
A Google security researcher revealed the flaw; Microsoft may release out-of-cycle fix.
InformationWeek (June 11, 2010)

Sophos Extends Antivirus To Cloud
Live security lookups and a refined host intrusion prevention system scan for viruses, malware, and malicious Web sites.
InformationWeek (June 10, 2010)

IBM Boosts Secure Development Practices
Focus is on making security an integral part of software, Web services, cloud, and portal development practices.
InformationWeek (June 10, 2010)

Massive Malware Hits Media Web Sites
Security researchers estimate that roughly 7,000 Web pages were compromised in a SQL injection attack this week, including The Wall Street Journal and Jerusalem Post.
InformationWeek (June 10, 2010)

Microsoft Patch Tuesday Brings Slew Of Fixes
Ten advisories detailing 34 vulnerabilities -- 6 deemed "critical"-- round out the June security patch cycle.
InformationWeek (June 9, 2010)

Passwords' Value Lie In Psychology, Not Security
Poor password security and rampant reuse means less-secure Web sites are a gateway to high-value targets for attackers.
InformationWeek (June 9, 2010)

Palo Alto Offers 'Read Only' Facebook Access
Next-generation firewalls are increasingly blending not just packet inspection, but also IPS, policy enforcement, and better security intelligence.
InformationWeek (June 8, 2010)

Trend Micro Launches Antivirus For Virtual Desktops
The goal is to prevent a performance hit from 100 virtual desktops all scanning and "phoning home" at once.
InformationWeek (June 7, 2010)

Zero Day Attack Targets Adobe
No patches yet while exploits are actively targeting Adobe's Flash, Acrobat and Acrobat Reader
InformationWeek (June 7, 2010)

Panda Intros Cloud Antivirus Service
The majority of Panda's virus, worm, malware, and Trojan signatures are stored in the cloud, reducing PC processing requirements.
InformationWeek (June 5, 2010)

FTC Settles With Spyware Firm
CyberSpy is barred from advertising that its kelogger can be installed on a PC without the owner's knowledge.
InformationWeek (June 5, 2010)

Facebook Clickjacking Worm Persists
Spread via status messages, there's no mention of the 'likejacking' attack on Facebook's security page.
InformationWeek (June 3, 2010)

Android Malware's Potential Detailed
Rootkits like the proof-of-concept developed by researchers could be used for eavesdropping or forcing smartphones to reveal its GPS coordinates.
InformationWeek (June 3, 2010)

SMB Security Monitoring Gaining Sophistication
Preventing breaches and attacks is increasingly driving security information and event management tool adoption for small and midsize businesses.
InformationWeek (June 2, 2010)

IE6 Browser Remains Attack Magnet
More than one-quarter of all Web traffic still flows to Microsoft's Internet Explorer 6 browser, which lacks a number of current security features, study shows.
InformationWeek (June 1, 2010)

Radware Security Appliance Targets Hybrid Attacks
APSolute Attack Prevention combines intrusion prevention, network analysis, denial-of-service prevention and on-call security expertise.
InformationWeek (June 1, 2010)

May 2010

Feds Bust 'Scareware' Ring
Three men allegedly used fake antivirus warnings and advertisements to sell $100 million worth of bogus software.
InformationWeek (May 28, 2010)

IBM Distributes Malware At Security Conference
Promotional USB thumb drives carried an unintended freebie: a keystroke-monitoring Windows worm.
InformationWeek (May 28, 2010)

Cheap Botnets A Boon To Hackers
Easy access to cheap botnet rentals and sophisticated attack tools are lowering the barriers to entry for criminals who can’t code.
InformationWeek (May 28, 2010)

Symantec Enhances SMB Security Suite
For small and midsize businesses, Symantec will offer improved endpoint security, backup capabilities, disaster recovery and messaging security this summer.
InformationWeek (May 27, 2010)

McAfee To Buy Trust Digital
The deal arms McAfee with enterprise mobile management and security software including the capability to manage enterprise iPhones.
InformationWeek (May 26, 2010)

Twitter For iPhone Attracts Malware
Hackers are deploying Trojans within links in tweets. One aims to swipe users' banking information.
InformationWeek (May 25, 2010)

Novell ID Manager 4 Spans Enterprise, Cloud
Identity Manager 4 targets automated ID management ecosystem, including tie-ins to Salesforce.com and Microsoft's SharePoint.
InformationWeek (May 25, 2010)

Paris in 5...
Learn how Parisians have their cake and eat it, on the cheap.
Fox News (May 24, 2010)

SmartCarving Technique Aces Data Recovery
The forensic data retrieval method reconstructs 99% of images stored on hard drives or media cards, and can be extended to text.
InformationWeek (May 13, 2010)

Symantec Offers SaaS Endpoint Security
The cloud-based service offers to secure PCs and servers with antivirus, antispyware, firewall, and HIPS.
InformationWeek (May 13, 2010)

Guidance To Buy Tableau For $12.3 Million
The deal to buy the forensic hardware maker Tableau aims to provide Guidance Software with 'write-blockers' to protect data during computer forensics evidence-gathering.
InformationWeek (May 12, 2010)

Software Piracy Dips, Despite Recession
In 2009, the United States recorded the lowest level of software piracy worldwide.
InformationWeek (May 12, 2010)

Malware Attack Bypasses Major Defenses
Almost all known anti-virus PC security suites are vulnerable to the bait-and-switch attack which cloaks attack code from security scanners.
InformationWeek (May 11, 2010)

Cybersecurity Summit Ends With Call To Action
Despite threats of infrastructure attacks, scant attention was paid to control systems during a global security conference.
InformationWeek (May 11, 2010)

Rise of the Service Catalog Manager
Is it time to run IT like a business?
Dice (May 10, 2010)

ATM Hack Demo Planned For Black Hat
A banned demonstration of remote and local ATM vulnerability exploits is set to resurface at the Black Hat Security Conference July 24th - July 29th in Las Vegas.
InformationWeek (May 10, 2010)

Symantec Posts 4Q Profit
Strong enterprise demand for hosted services, data loss prevention, backup, and archiving help push security vendor into black.
InformationWeek (May 7, 2010)

Sony Blocks Linux On PS3
Removal 'for security reasons' of the 'Install Other OS' capability prompts a class action suit from PlayStation 3 owners.
InformationWeek (May 6, 2010)

Express Airport Security Set To Resume
Alclear purchases assets of popular -- but defunct -- airport express security provider, Clear, and prepares to restart the service this autumn.
InformationWeek (May 6, 2010)

Cybersecurity Summit Targets Public, Private Cooperation
A gathering of tech industry leaders, policymakers, and national security officials aims to address the risks of cyberattacks on infrastructure.
InformationWeek (May 4, 2010)

China Missing From Top Spammers List
The majority of spam produced globally comes from the United States, followed by India and Brazil. China isn't in the top 15, says a Sophos report.
InformationWeek (May 3, 2010)

April 2010

Job Role: IT Asset Manager
Want to use IT to save money? First it helps to know what technology your organization actually uses. Enter IT asset management.
Dice (April 22, 2010)

March 2010

The Rise of Self-Encrypting Drives
Automated drives protect at-rest data, but are they ready for business use?
Dice (March 16, 2010)

Next writing archive: 2009


Mathew Schwartz
Mat@PenandCamera.com