Microsoft Uses Legal System to Combat Botnet |
- Microsoft Uses Legal System to Combat Botnet
- Microsoft backs down over surveillance guide
- UK registry to implement DNS security protocol
- Securing your Wi-Fi airspace
- Google told to ditch Street View images after 6 months
- Cloud computing security challenges unite hosting providers, security specialists
- Microsoft downs site after top-secret guide published
- 66% of Brits unaware of ad-related email scanning
- FTC seeks extensive information from firms being investigated for P2P breaches
- Online Payment Security: Should Government Intervene?
- Microsoft retreats from demand that killed whistleblower site
- Microsoft's Spy Guide: What You Need to Know
Microsoft Uses Legal System to Combat Botnet Posted: 26 Feb 2010 08:00 AM PST |
Microsoft backs down over surveillance guide Posted: 26 Feb 2010 08:00 AM PST |
UK registry to implement DNS security protocol Posted: 26 Feb 2010 08:00 AM PST |
Posted: 26 Feb 2010 08:00 AM PST Wi-Fi sensors have long been scanning the unlicensed 2.4GHz and 5GHz airwaves for network intruders and phishing scams. Each security monitor can detect potential intruders across environments ranging from approximately 15,000 square feet to about 90,000 square feet in size. Why are there such vast coverage differences and how do you plan and implement your sensor network accordingly? |
Google told to ditch Street View images after 6 months Posted: 26 Feb 2010 08:00 AM PST |
Cloud computing security challenges unite hosting providers, security specialists Posted: 26 Feb 2010 08:00 AM PST |
Microsoft downs site after top-secret guide published Posted: 26 Feb 2010 08:00 AM PST The noted government whistleblowing website Cryptome has been taken down after Microsoft saw red over its publication of a top-secret Internet surveillance guide normally shown only to law enforcement agencies. |
66% of Brits unaware of ad-related email scanning Posted: 26 Feb 2010 08:00 AM PST |
FTC seeks extensive information from firms being investigated for P2P breaches Posted: 26 Feb 2010 08:00 AM PST |
Online Payment Security: Should Government Intervene? Posted: 26 Feb 2010 08:00 AM PST On January 26, 2010, two researchers at Cambridge University, Steven J. Murdoch and Ross Anderson, released a working paper with the provocative title, "Verifed by Visa and MasterCard SecureCode: or, How Not to Design Authentication". It directly attacks 3D Secure as a poorly designed authentication scheme, and calls for regulatory intervention to protect consumers. To what extent does the report raise fair criticisms, and how should the industry and/or regulators respond? |
Microsoft retreats from demand that killed whistleblower site Posted: 25 Feb 2010 08:00 AM PST |
Microsoft's Spy Guide: What You Need to Know Posted: 25 Feb 2010 08:00 AM PST Since 1996, the whistleblower site Cryptome has been posting sensitive government and corporate documents. Now Cryptome has been stricken from the Web after releasing the Microsoft Online Services Global Criminal Compliance Handbook , a "spy guide" for law enforcement detailing what data Microsoft has, keeps, and can relinquish. Since most of you are Microsoft users, there are a few tidbits of information you'll need to know before purchasing Xbox Live points, logging onto Office Live, or sending an e-mail through Hotmail. |
You are subscribed to email updates from "Cisco" via ehsan in Google Reader To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment