Cross-platform botnet targets both Windows and Mac users

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

Cross-platform botnet targets both Windows and Mac users


Cross-platform botnet targets both Windows and Mac users

Posted: 09 May 2011 08:36 AM PDT


A McAfee researcher has discovered a Java-based, cross-platform botnet that can infect both Mac and Windows macines.

IT caught in crossfire when it comes to smartphone privacy

Posted: 09 May 2011 08:03 AM PDT


The news that iPhones, iPads and Android devices secretly track the locations of their owners poses a potentially serious dilemma for IT staffs. If someone's manager asks IT to retrieve that data and hand it over, what should IT do? We certainly have to acknowledge that a device that's used for business purposes but automatically tracks personal information blurs the line between personal and corporate information.

Amazon Service Outage Reinforces Cloud Doubts

Posted: 09 May 2011 07:31 AM PDT


The days-long partial outage of Amazon.com's EC2 cloud service has heightened fears that the technology doesn't meet the security and performance needs of large businesses.

Security pros launch cybersecurity index

Posted: 09 May 2011 06:07 AM PDT


The index will track the overall sentiment of a group of cybersecurity experts to offer a measure of cyber risk.

Cisco and NSS Labs still arguing firewall vulnerability test results

Posted: 09 May 2011 08:20 AM PDT


NSS Labs today is expected to say four out of five vendors -- Palo Alto Networks, Juniper, Fortinet and SonicWall -- whose firewall equipment it said was vulnerable to a hacker exploit have corrected the problem. The fifth, Cisco, maintains its ASA firewall isn't susceptible to the exploit known as the "TCP Split Handshake," which lets an attacker remotely fool the firewall into thinking an IP connection is a trusted one behind the firewall.

Cisco's mass of acquisitions spawned growth, competition

Posted: 09 May 2011 03:00 AM PDT


Cisco says its success rate with acquisitions is 70% while 90% of them fail for the rest of the industry.

25 ways IT will morph in the next 25 years

Posted: 09 May 2011 03:00 AM PDT


Imagine a world where the computers, networks and storage systems are all tens of thousands of times faster than they are today -- and then think about the sci-fi type of applications that will be possible.

John Chambers on the network

Posted: 09 May 2011 03:00 AM PDT


The network is more important today than at any time in history.  In the last 25 years it has had a transformative effect on the way we all live, work, learn and play but I believe it will deliver even greater change in the next decade than it has in the last quarter century.

25 ways IT will morph in the next 25 years

Posted: 09 May 2011 03:00 AM PDT


Imagine a world where the computers, networks and storage systems are all tens of thousands of times faster than they are today -- and then think about the sci-fi type of applications that will be possible.

Phishing Becomes More Sophisticated

Posted: 09 May 2011 02:12 AM PDT


Highly targeted phishing emails have become the preferred method for illegally breaking into corporate networks.

Native intelligence: Awareness and humor

Posted: 09 May 2011 09:00 AM PDT


Recently I asked long-time friend and colleague K Rudolph, CISSP, chief inspiration officer at Native Intelligence some questions about her work.

Broadcom buying smart-card security specialist SC Square

Posted: 08 May 2011 01:15 AM PDT


Chip maker Broadcom said Sunday that it will pay US$41.9 million for SC Square, a move that will bring expertise in smart-card security to the Irvine, California, architect of silicon for communications equipment.

0 comments:

Post a Comment