Is data stored “in the cloud” protected by the Fourth Amendment?
The implementation of cloud computing by companies and individuals is rising slowly, but steadily. There will always be people who are ready to bear the risk of a new way of …
Scammers aggressively targeting Haiti donations
A week after the devastating Haiti quake, scammers are working harder than ever to exploit the good will of people that want to help the victims by giving donations. The FBI …
D-Link routers vulnerability allows hackers to reconfigure admin settings
Recently, SourceSec Security Research announced on its blog that they have discovered a vulnerability in D-Link routers that allows outsiders and insiders to access and edit …
Data security for Mac users
PGP announced the latest version of PGP Desktop for Mac which now also supports Boot Camp, so users can have complete protection for machines running dual Mac OS X and Windows …
Worldwide infrastructure security
Arbor Networks, in cooperation with the Internet security operations community, has completed the fifth edition of an ongoing series of annual operational security surveys. …
Patch management simplified
Patching of vulnerable software, in particular third party software, which isn’t supported by Microsoft WSUS, has been a cumbersome and resource demanding process, …
Rogue software details: Win Security 360
Win Security 360 is a rogue security application. In order to remove it, find out what files and registry entries to look for below. Known system changes: Files c:\Desktop\Win …
IT budgets in 2010 to be at 2005 levels
IT budgets will essentially be flat in 2010, increasing by a weighted global average of 1.3 percent in nominal terms, compared with 2009 levels where IT budgets declined 8.1 …
South Korea preparing for cyber war
South Korea is determined not to be caught off guard again when it comes to cyber attacks directed against her. Mimicking the US defensive steps, the South Korea Ministry of …
Secure computing on a USB flash drive
The new IronClad USB drive shrinks a laptop’s hard drive – including the entire operating system, software applications, and files – onto a secure flash …
Four information management roles IT departments need
Gartner has identified four information-management roles that IT departments need to establish and recruit from outside the IT team in a major trend that will affect both IT …
Phishing attacks escalate, DIY cybercrime kits to blame
It used to be that cybercrime was almost exclusively perpetrated by individuals and groups who had in-depth knowledge about the techniques, mechanisms and technologies on …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage