Временная скидка 60% на годовую подписку!
Главная Статьи (страница 128)

Статьи

Firms fail to secure mobile, cloud data

The failure of corporate chiefs to make security a priority and a reactive approach to data protection has left many companies vulnerable to attack, especially via emerging technologies such as smart phones and cloud computing, according to a survey of information technologists. published on Tuesday.

Геймдев для iPhone: как чужой движок помогает сделать свою игру

Герои 3D Max, Maya, Cinema и прочих графический 3D-студий в конце концов перестают удовлетворяться создавая и оживляя созданных персонажей анимацией. Хочется с ними что-то сделать – красивое демо, базовую игру, что угодно, только бы вытащить свои творения за пределы 3D-редактора

Breadth of Security Issues in 2009 = Stunning

The Security Response team has compiled the top security trends of 2009. We pulled data from the Global Intelligence Network and the experiences of the thousands of analysts and security experts at Symantec to come up with the top trends for the year. While none of these trends will be a surprise to anyone even casually following the threat landscape, when compiled and summarized, it is clear that the breadth of security problems in the past year was pretty stunning.

Firefox 3.6 to prevent harmful add-ons

The soon-to-be shipped version 3.6 of the Firefox browser will have a new feature that will make it more stable. It is called Component Directory Lockdown, and it prevents third-party applications (add-ons and plugins) to store their own code into the "components" directory, where most of Firefox's own code is stored.

Penetration Testing Grows Up

Penetration testing, once considered a risky practice for the enterprise and even a tool for evil hacking purposes, is becoming more of an accepted mainstream process in the enterprise mainly due to compliance requirements, more automated, user-friendly tools -- and most recently, the imminent arrival of a commercial offering based on the popular open-source Metasploit tool.

Viruses, Malware Creeping into Online Games

Viruses and malware are words not normally linked to video games, that is until you talk to Michael Helander, VP of Sales and Marketing at Lavasoft. His software company has developed a new product, Ad-Aware Game Edition, that's designed to protect online gamers from viruses, a problem that's "increased over 600% in the last year," according to their website.

First Programmable Quantum Computer Created

Quantum processing units are fundamentally different in a number of ways. First, where a regular bit can be only 1 or 0, a quantum bit (or qubit) only assumes a value of 1 or 0 when it is observed. Additionally, Quantum computers aren’t bound by Boolean operators like ‘and, ‘or’ and ‘not’. Finally, two qubits can be “entangled”, meaning they will always have the same value when observed, even if separated.

Отдел ненужных вещей

Не так давно наше "Управление "К" обнаружило "подозрительную активность китайских хакеров", о чем не преминуло нам всем сообщить. Мне, конечно, радостно от того, что на страже наших с вами компьютеров кто-то как бы стоит, но после прочтения статьи напрашивается естественный вопрос: а дальше-то что? Неужели захлопнутся за "китайскими хакерами" ворота русского СИЗО? Неужели никто не будет больше грозить ботнетами нашим южным границам?

Лучшие инструменты пен-тестера: исследование удаленной системы

Важная часть любого пентеста - сбор данных об удаленной системе. Более того, именно с разведки и начинается атака на удаленный хост. Чем больше известно о виртуальном противнике, тем проще отыскать инструменты, чтобы отправить его в нокдаун

Fedora 12 `Constantine` has been released

The release of Fedora 12 will mark the fourth major operating system update this fall. Codenamed 'Constantine' and like the three previous OS releases, Windows 7, Ubuntu 9.10 openSUSE 11.2, the Linux based Fedora 12 comes packed with a variety of improvements and new features.

Microsoft adds access controls for SQL Azure online database

Microsoft is creating technology to give businesses more fine-grained control over access to data stored in the company's upcoming SQL Azure database cloud service, a senior engineer said today. Code-named Vidalia, the technology will provide "trustworthy data collaboration for highly sensitive business data across disparate trust domains," said Microsoft technical fellow Dave Campbell in a talk at Microsoft's Professional Developers Conference 2009 (PDC09) in Los Angeles.

Open Hardware Micro-Robot Swarm Project

Why would you want to build a 100-strong swarm of mini robots? Well, aside from having them as your minions, you might be able to learn about "artificial self-organization," and "control in large robotic groups," which should come in useful during the inevitable robot insurrection. The swarm robot project, undertaken by the Universities of Stuttgart and Karlsruhe in Germany, aims to produce mini drones that can communicate with one another to avoid collisions, while keeping to a volume of less than three centimeters cubed

Выборочное резервное копирование в Windows: как, чем, на что?

Сам я пользовался разными средствами резервного копирования, от простых, вроде стандартного backup Windows, до корпоративных. Как пользователя меня естественно подкупила "Машина времени" от Apple. Но я знаю и то, что мне в ней не нравится

McAfee warns of cyber warfare

Security giant McAfee today launched a new report urging public and private sector organisations to collaborate more effectively to ensure that critical national infrastructures are able to withstand any future cyber warfare attacks.

Страница 128 из 293В начало...100110120126127128129130 140150160...

Еженедельный дайджест

Спасибо за подписку! Мы будем присылать важные новости ИБ в еженедельном дайджесте
Ошибка при подписке Случилась ошибка при создании подписки на наш дайджест. Пожалуйста, попробуйте позднее
Важные события и скидка на подписку:
«ХАКЕР» ДОСТУПЕН ТОЛЬКО В ЭЛЕКТРОННОЙ ВЕРСИИ
Оформи подписку — получи:
  • доступ к платным материалам сайта
  • доступ ко всем номерам PDF
4000 р.
на год
920 р.
на месяц

«Хакер» в соцсетях

Материалы для подписчиков