Source code management a weak spot in Aurora attacks

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

Source code management a weak spot in Aurora attacks


Source code management a weak spot in Aurora attacks

Posted: 04 Mar 2010 08:00 AM PST


Companies should take extra steps to secure their source code from the type of targeted attacks that hit Google, Adobe, Intel and others over the past few months.

Tweet this: Social network security is risky business

Posted: 04 Mar 2010 08:00 AM PST


The debate about whether companies should let their workers access social networking sites on the job is about more than corporate productivity; It's about security, too.

Researchers find way to zap RSA security scheme

Posted: 04 Mar 2010 08:00 AM PST


Three University of Michigan computer scientists say they have found a way to exploit a weakness in RSA security technology used to protect everything from media players to smartphones and e-commerce servers.

Former NSA tech chief: I don't trust the cloud

Posted: 04 Mar 2010 08:00 AM PST


The former National Security Agency technical director told the RSA Conference he doesn't trust cloud services and bluntly admonished vendors for leaving software vulnerabilities unpatched sometimes for years.

Typical Windows user patches every 5 days

Posted: 04 Mar 2010 08:00 AM PST


The typical home user running Windows faces the "unreasonable" task of patching software an average of every five days, a security and vulnerability research company said.

Check Point puts VPN in USB stick

Posted: 04 Mar 2010 08:00 AM PST


Check Point has become the latest vendor to push the USB stick as the road warrior's best friend, announcing a way for business travellers to carry around their office desktop on a single drive.

Security firms help shut down Mariposa botnet

Posted: 04 Mar 2010 08:00 AM PST


The cybercriminals behind the Mariposa botnet, which attacked 13 million computers worldwide, stealing sensitive personal data such as social networking logins and credit card details, have been arrested, says Panda Security and Defence Intelligence.

Underrated computing threats you need to know about

Posted: 04 Mar 2010 08:00 AM PST


There's the danger you know, and then there's the danger you don't know.

Gov't could block YouTube under Digital Economy Bill

Posted: 04 Mar 2010 08:00 AM PST


The government has amended the Digital Economy to give high court judges the power to block any website with a "substansial" amount of copyright infringing content, such as YouTube.

Tracing attack source key to cybersecurity strategy, Chertoff says

Posted: 04 Mar 2010 08:00 AM PST


Michael Chertoff, former head of the U.S. Department of Homeland Security, talked of the difficulties in creating a national cybersucurity plan during an interview with Computerworld.

Attacks on Google may have been work of amateurs

Posted: 03 Mar 2010 08:00 AM PST


Contrary to general perception, the recent cyberattacks against Google and more than 30 other high-tech companies were carried out by relatively unsophisticated attackers using outdated botnet tools, according to an Atlanta-based security firm.

New exploit technique nullifies major Windows defense

Posted: 03 Mar 2010 08:00 AM PST


The disclosure of a new exploit technique that bypasses an important Windows security feature may lead to more successful attacks against Microsoft's newer operating systems, researchers said today.

0 comments:

Post a Comment