Poor patching was 2009`s biggest security threat
The biggest single threat to computer security is now the inability of PC users to patch their computers, Symantec's review of 2009 year has hinted.
The biggest single threat to computer security is now the inability of PC users to patch their computers, Symantec's review of 2009 year has hinted.
Microsoft has decided to drop a standalone product designed to protect PCs against malware threats in order to concentrate on server-based security and management software and hosted services.
Researchers have demonstrated structural cracks in GSM mobile networks that make it easy to find the number of most US-based cellphone users and to track virtually any GSM-enabled handset across the globe.
McAfee is scrambling to update its antivirus products after a recent update caused system crashes.
Facebook and Microsoft have announced a deal which will let the social networking site's users collaborate on creating documents online using the online version of Office 2010.
Требований к клавиатуре вроде бы не так уж и много. Если не брать в расчет навороченные игровые модели с массой дополнительный функций, описание которых выходит за рамки нашего сегодняшнего теста, от среднестатистической клавиатуры нужно, по большому счету, одно: чтобы многочасовое сидение за компьютером не превратилось в настоящую пытку для твоих рук
Есть много способов борьбы со всякой малварью - начиная от самых простых антивирусов, проактивных защит и файрволов и заканчивая сложными способами вроде эмуляции оборудования и операционных систем. На программном рынке можно легко отыскать способы защиты своей системы
С помощью OSSIM (Open Source Security Information Management) администратор может получить информацию о любом событии в сети, хосте или устройстве. Отдельная система подвергается детальному анализу, для чего собирается информация о ее типичном использовании (например, средний трафик за день), активности пользователя (почта, аська, http, ftp и т.п.) и производится мониторинг сессии в реальном времени
Многие считают, что стандартная утилита для удаления программ, существующая в Windows, является недостаточно качественной, оставляя после программ «мусор» — всевозможные ненужные данные, неиспользуемые библиотеки, записи в реестре
A security researcher has uncovered multiple vulnerabilities affecting PayPal, the most critical of which could have enabled attackers to access PayPal's business and premier reports back-end system.
A team of three developers has created a toolkit that can bypass Microsoft’s limitations on developing programs for the Zune. The kit allows independent programmers to create applications for the digital music player.
Oracle has released updates to check hackers exploiting vulnerability in Java program to spread malware into computers.
Apple fans who claim that the Mac is more secure than PCs not only are wrong, but they're ignorant about their security risks, says a well-known hacker and security expert who has made a name for himself finding vulnerabilities in Windows. And Apple itself doesn't take security as seriously as does Microsoft, he claims.
In an effort to avoid potential crashes caused by installing new patches to computers infected with rootkit malware, Microsoft’s newest update will skip installation on infected machines.
A Japanese cyber extortion gang is running a new "name to shame" scam by duping users who pirate adult games into installing malware, then demanding that they pay up to keep their names from being publicly posted on the Web, a researcher said today.
Nathanael Paul likes the convenience of the insulin pump that regulates his diabetes. It communicates with other gadgets wirelessly and adjusts his blood sugar levels automatically.
Lt. Gen. Keith Alexander told the Senate Armed Services Committee April 15 that he would work to protect the privacy rights of Americans—even as he noted the amount of uncharted territory in cyber-law.
While only about 10 percent of industrial control systems are actually connected to the Internet, these systems that run water, wastewater, and utility power plants have suffered an increase in cybersecurity incidents over the past five years.
Hackers are exploiting the controversy surrounding illegal downloading in a bid to steal credit card details from web users, says F-Secure.
Apple today patched a critical Mac OS X vulnerability used by a security researcher three weeks ago to win $10,000 for hacking Safari at the Pwn2Own contest.
Are you smarter than a third-grader? Because the online education system used by the Fairfax County public schools apparently is not.
Security researchers have discovered flaws in common file formats, including .zip, which can be used to sneak malware onto computers by evading antivirus detection.
A block of 86 lines of C# code is creating a buzz online following claims it may make BitTorrent downloads untraceable.
У многих сегодня компьютеры подключаются к домашним телевизорам диагональ которых переваливает порой за 50″. А еще нередко можно встретить пользователей с беспроводными мышками и клавиатурами. Так почему бы не завалиться на диван и не посерфить на большом экране в интернете вместе с браузером специально адаптированным под такие занятия?
Стряпня — одно из моих любимых увлечений. Недавно, когда я в поте лица трудился над ризотто с морепродуктами, меня осенило: стряпня — это разновидность программирования. Люди получают удовольствие от процесса приготовления пищи практически по тем же причинам, по каким они получают удовольствие от программирования
System Center Configuration Manager 2007 обладает рядом полезных возможностей, позволяющих на порядок упростить жизнь IT-шнику. В этом ролике мы покажем, как произвести инвентаризацию установленных программ и оборудования, познакомимся с функцией управления требуемой конфигурацией, создадим пакет с программой и распространим его на клиентах, а также настроим средства для удаленного управления компьютерами.
If you're concerned about maintaing the most secure Mac possible--or perhaps you live or work on both Windows and Mac OS--BitDefender would like to talk to you. A longtime provider of security products for windows, BitDefender now offers two antivirus products for Mac users looking to batten down the digital hatches.
Tomorrow at Black Hat Europe a researcher will demonstrate a new, powerful breed of clickjacking attacks he devised that can bypass newly constructed defenses in browsers and Websites.
A third of 60 anti-malware products for Windows XP failed to make the grade in independent security tests.
The Apache Foundation, a nonprofit organization that supports open source software projects and is itself supported by important companies like Google, Yahoo, Microsoft, HP, and Facebook, has been attacked, and the Apache Infrastructure Team warned people today that some passwords were compromised in the process.
Microsoft fixed 25 holes on Tuesday, including critical ones for Windows that could be triggered by browsing to a malicious Web page, while Adobe plugged 15 holes in Reader and Acrobat and launched its new updater service.
Users hate them. They're a massive headache to network administrators. But IT departments often mandate them nonetheless: regularly scheduled password changes — part of a policy intended to increase computer security.
У каждого из команды ][ — свои предпочтения по части софта и утилит для пентеста. Посовещавшись, выяснили: выбор так разнится, что можно составить настоящий джентльменский набор из проверенных программ. На том и решили
Microsoft has delivered a significant update to its developer tools with the release of Visual Studio 2010, .Net Framework 4 and Silverlight 4.
Russia is not a safe haven for criminals or spammers, according to a Russian trade association campaigning to tighten up the admitted shortcomings of local cybercrime laws and build international cooperation.
Opera has announced Apple's approval of the company's Opera Mini browser in the iPhone App Store.
Since its launch, Internet Explorer 8 has blocked access to over 560 million sites that it determined were serving malware, or about 3 million blocks per day, said Brandon LeBlanc in a blog post on Friday. However, it is unclear how many of those sites were legitimate, duped into serving malware laced ads, sent to them from their ad network.
Michael Chertoff, former US secretary of Homeland Security; Richard Clarke, chairman of Good Harbor Consulting; and Marc Rotenberg, executive director of the Electronic Privacy Information Center, share their views on how to prevent future cyberthreats. They outline areas of focus and how to protect against cyberthreats without imposing on privacy rights.
Появился новый таск-менеджер, который совершенно бесплатен. Изначально он заточен под групповую работу. Написан очень красиво и напакован всякими приятными штучками. Лучше всего вам про него расскажет скринкаст от WWD:
While many enterprises continue to build systems and strategies to protect their relational databases, many organizations haven't done enough to secure the information in the most common database format: the flat-file database, experts say.