Biden, Cameron hit out at Internet censorship, hacking

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

Biden, Cameron hit out at Internet censorship, hacking


Biden, Cameron hit out at Internet censorship, hacking

Posted: 01 Nov 2011 08:24 AM PDT


U.S. Vice President Joseph Biden and British Prime Minister David Cameron Tuesday condemned efforts by some countries to censor their citizens' use of the Internet, making a case that free expression online has long-term benefits.

How to have real risk management

Posted: 01 Nov 2011 08:10 AM PDT


Akamai Technologies CSO Andy Ellis talks about some of the things organizations need to consider in order to better manage risk.

Researchers defeat CAPTCHA on popular websites

Posted: 01 Nov 2011 07:47 AM PDT


Researchers from Stanford University have developed an automated tool that is capable of deciphering text-based anti-spam tests used by many popular websites with a significant degree of accuracy.

Standardizing the desktop: Strategies for success

Posted: 01 Nov 2011 07:09 AM PDT


IT is often at the forefront of technology innovation -- but not always. When it comes to the concept of a standard desktop -- every employee's core install that consists of an operating system, applications, hardware drivers and a security suite -- IT has moved at a snail's pace.

They are the 11 percent (or less) who really get security

Posted: 01 Nov 2011 06:58 AM PDT


Our survey shows only a small percentage of respondents making a top priority of data protection, strengthened governance and risk-based investments.

'Advanced persistent threat' concerns boosting security budgets

Posted: 01 Nov 2011 03:00 AM PDT


Heightened awareness about stealthy network attacks designed to steal sensitive information -- what some call the "advanced persistent threat" -- is having an impact in raising security budgets and increasing executive management involvement in information technology, according to a survey published today.

Juniper brings security software to Samsung devices

Posted: 31 Oct 2011 04:16 AM PDT


Juniper Networks' suite of mobile security and device management tools is coming to three Samsung Electronics devices, marking the first time the company has provided its SSL VPN software for Google's Android OS.

5 Things You Need to Know About Android Phones

Posted: 31 Oct 2011 02:24 AM PDT


Android phones are in high demand by workers, but they lack key security features. Here are the top five things you can do to make sure Android phones in your organization don't create a security nightmare.

Why Legal Concerns Put a Halt to BYOT at Baxter

Posted: 31 Oct 2011 02:11 AM PDT


Baxter International wanted to allow employees to bring their own devices to work, but legal concerns related to e-discovery had to be resolved first.

Opposition to Stop Online Piracy Act grows

Posted: 31 Oct 2011 01:47 AM PDT


A coalition of technology trade groups today joined the growing chorus of voices opposing a recently filed anti-piracy bill that they contend is far too heavy-handed.

A Law Firm's Hiring Strategies for Handling New Security Concerns

Posted: 31 Oct 2011 01:44 AM PDT


New data privacy concerns and increased regulation have led law firm Morrison & Foerster to add a new position. Here's what they did to facilitate that hire.

'Nitro' hackers use stock malware to steal chemical, defense secrets

Posted: 31 Oct 2011 12:42 AM PDT


Attackers used an off-the-shelf Trojan horse to sniff out secrets from nearly 50 companies, many of them in the chemical and defense industries, Symantec researchers said today.

Big-name companies easy target for social engineers

Posted: 31 Oct 2011 12:34 AM PDT


For a second year, participating hackers took part in a social-engineering, capture-the-flag event this summer's at Defcon 19 security conference. And a newly-released summary of findings from the exercise reveal organizations are highly vulnerable to social engineering.

Check Point buys compliance technology vendor Dynasec

Posted: 30 Oct 2011 11:33 PM PDT


Check Point Software is buying governance, risk management and compliance vendor Dynasec Ltd., which will add software that can help businesses comply with government regulations such as Sarbanes-Oxley and health insurance portability and accountability act (HIPAA).

Lazy hackers port ancient Linux Trojan to Mac OS X

Posted: 30 Oct 2011 11:15 PM PDT


Hackers are testing new Mac malware that they've ported from a nine-year-old Trojan horse originally written for Linux, according to security experts.

0 comments:

Post a Comment