- Welcome Guest
- Sign In
Most security professionals believe that endpoint security is a strategy in which security software is distributed to end-user devices but centrally managed. Endpoint security systems work on a client/server model. A client program is installed on or downloaded to every endpoint, which in this case...
Hiring a professional penetration tester is often a humbling experience. Using a mix of simple social engineering and technology savvy, a professional is often able to expose dangerous security holes in an organization's IT infrastructure with ease. In a few days, a penetration tester can identify ...
For anyone thinking that the Google-China dynasty war would be resolved quickly -- and that mutual economic concerns would ultimately force both armies to ratchet down this uniquely 21-century cyberduel -- this was the week for the rudest of awakenings. The hacking hits just keep on coming in China....
IBM is joining forces with the U.S. Federal Aviation Administration to protect the nation's civilian aviation system from the ever-growing threat of cyberattacks. They are working on building a prototype security system capable of protecting the vast amount of information flowing daily through the F...
Cloud computing -- certainly a hot topic at the RSA conference held earlier this month in San Francisco -- is in some ways being eclipsed by security and accountability concerns. Who owns the data? Who is answerable if the cloud fails? Who is responsible if a virtual machine holding data from a comp...
The Federal Bureau of Investigation on Thursday joined the Department of Homeland Security in seeking to hire cybersecurity experts from the private sector. "I want to send out an invitation to those of you in the audience who want to serve the country to join the FBI," FBI Director Robert Mueller s...
The three men accused of unleashing a vicious cyberassault that infected millions of computers worldwide may now be in jail, but the damage they left behind should serve as a warning for computer users to stay vigilant. The Mariposa botnet, a massive network of infected computers designed to steal a...
At about the same time in January that Google reported its infrastructure had been hacked, someone broke into Intel's systems. However, unlike Google, which reported the attack publicly and ended up getting the federal government involved, Intel kept relatively quiet about its intrusion. The only me...
Within about a year, the United States may be better prepared to defend itself against a cyberattack, if the Senate passes Bill H.R. 4061, also known as the Cybersecurity Enhancement Act of 2009. This bill is a combination of the Cybersecurity Research and Development Amendments Act of 2009 and the ...
News that students in two Chinese schools could be behind recent well-publicized online attacks on Google and other major U.S. corporations doing business in China has security experts running for cover. McAfee, which has dubbed the hacks "Operation Aurora," described the series of attacks as highly...
As botnets go, the Kneber botnet, which has hit about 75,000 PCs in roughly 2,500 companies worldwide, is fairly minuscule. However, it's disproportionately dangerous because it's aimed at very specific targets -- corporations and government departments -- whose PCs store critically important inform...
Earlier this week, Cyber ShockWave, a simulated cyberattack on America, once again showed that the U.S.'s cybersecurity is not up to the task of protecting the country's infrastructure. Under the hypothetical scenario cooked up by Cyber ShockWave's planners, the attack was launched through smartphon...
Cisco looks to be gearing up to take advantage of the Obama administration's emphasis on cybersecurity and cooperation between the public and private sectors. It has appointed former White House cybersecurity adviser Melissa Hathaway as consultant. She will help liaise with the federal government. "...
Google has allegedly requested help from the National Security Agency in tracking down hackers who attacked its infrastructure. The development has raised concerns among privacy advocates. The Washington Post broke the story that Google had turned to the NSA on Thursday, citing anonymous sources. Se...