With 2009 behind us, we look forward to what the next year might bring. The
question of what changes might be coming in terms of data security begs
answering. The ongoing battle between hackers and the teams defending sensitive
information means that the techniques in use by both sides last year will be
updated, and the better you are able to predict what the other side may do, the
more likely you will be prepared to defend against it. Here are some of the key
concepts we believe are shifting most quickly, and how they might affect your
overall database security plan.
-
10 Security, Quality Issues Microsoft Must Address Quickly
Microsoft is all over the news this week, but unfortunately for the company, it's for the… -
Microsoft controls worldwide physical security operations from three sites
What does business continuity mean to you? For Microsoft Global Security it can involve l… -
Casual hack: Hacking the NevoSoft games
Casual game is a kind of computer game designed for a wide range of users. The term "… -
Pwn2Own will make Apple look bad
The annual Pwn2Own contest starts today at the CanSecWest conference in Vancouver, Canada… -
GOV sites are on the spot: hacking the web site of Ministry of Education and Science of Ukraine
Lately, I see more and more vulnerable government web sites. And the reason is banal: gov… -
Backstreet`s Back: total destruction of the Backstreet Boys band
Salute, my dear admirer of the Backstreet Boys band! Today I will tell you an interesting…
-
Hacktivists ransack Hitler defender`s email
Self-proclaimed anti-fascist hackers have struck a major blow at controversial World War … -
7 steps from Injection to the Admin Access via RDP
Any break-in pursues its own aim, which determines its value. It's up to you to decide wh… -
Google Analytics under attack over privacy
Google has defended its free Analytics web traffic service against arguments that it conf… -
Attacks spread malware with help from AppleInsider
Malware purveyors are exploiting web vulnerabilities in appleinsider.com, lawyer.com, new… -
2009 is the year of the botnet
Malicious web sites and botnet activity continued to dominate the cyber securiy landscape… -
Second Windows 7 activation hack appears
It works by nuking the verifying sppcompai.dll from orbit, and even goes so far as to dec…