A recent survey conducted by Tufin Technologies, a provider of firewall
management software, finds that of the 242 IT professionals working at companies
with over 1,000 employees, 30 percent said they audited their firewall security
only once in every five plus years. So when those systems are ultimately
compromised, and then used to harm systems elsewhere, who should be liable?
Obviously, the perpetrator of the crime is primarily responsible. But shouldn't
the organization that failed to take reasonable security measure carry some
burden of the blame?
-
Knocked-Out AOL: How The AOL Servers Were Hacked
AOL Corporation has always been a kind of honey pie for all possible kinds of hackers. Mi… -
Casual hack: Hacking the NevoSoft games
Casual game is a kind of computer game designed for a wide range of users. The term "… -
All-over-IP 2011 удивит новациями
Гостей All-over-IP 2011 ждет мощный профессиональный и общественный эффект благодаря уник… -
-
Hackers’ playground: hackers’ brain-twisters
Have you ever thought about legal hacking? Is it possible to do the things you love and p… -
Criminal hackers less competent than ten years ago
Although IT security threats have risen in number and diversity over the last decade, the…
-
China suffers from hackers too
The Glorious People's Republic of China is facing a wave of hack attacks from inside its … -
Son of GhostNet: China-based hacking targets India government
The people who uncovered GhostNet, an extensive cyber espionage network that targeted the … -
How hackers took down Baidu
China's Baidu says in legal papers that that an obvious scammer was able to con Register.… -
Researchers dissect ZeuS botnet blueprint
A little knowledge and a few thousand dollars is all it takes to build a fully functional… -
The rise of amateur-run botnets
It used to be that cyber criminals were people with a highly technical skill set, but thi… -
Дистрибутив LinuxMCE: бесплатное решение для управления домом
Технология "умного дома" (Smart Home) уже не один год будоражит умы как разрабо…