ABOUT ME
Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Edge Web Hosting Enhances Security By Offering Two-Factor Authentication

Edgewebhosting Inc., a leading provider of mission-critical managed hosting services, today announced it has partnered with Duo Security.Baltimore, Maryland (PRWEB) December 20, 2012 Edgewebhosting Inc., a leading provider of mission-critical managed hosting services, today announced it has partnered with Duo Security. Duo Security’s two-factor authentication service brings strong, scalable and highly secure remote access to Edge’s managed hosting solutions. ...

View the original article here

Share |

State Dept security chief resigns after Benghazi

File of the U.S. Consulate in Benghazi is seen in flames during a protestFour State Department officials resigned under pressure Wednesday, less than a day after a damning report blamed management failures for a lack of security at the U.S. diplomatic mission in Benghazi, Libya.



View the original article here

Share |

Announcing the Panelists of Security Watch Summit 2012!

We are thrilled to have the following four speakers join Neil Rubenking, lead security analyst at PC Magazine, for a spirited 2-hour discussion/

View the original article here

Share |

Windows 8 Security Solutions Certified by AV-Test

Windows 8 includes built-in antivirus protection, but most industry experts agree that you'll want more. Which products are ready to protect your brand-new Windows 8 systems?

View the original article here

Share |

New RIM platform clears U.S. security, challenges remain

Research In Motion CEO Heins displays features of Blackberry 10 during his keynote address during the Blackberry Jam Americas in San JoseTORONTO (Reuters) - Research In Motion Ltd said on Thursday it has won much-coveted U.S. government security clearance for its BlackBerry 10 devices which are due to hit store shelves in the first quarter of 2013. The company said the new enterprise management platform has received certification that would allow government agencies to deploy the new smartphones as soon as they are launched. But RIM must still convince the agencies to stick with its security-focused smartphones and deploy the new BB10 devices, which will come in keyboard and touchscreen models. ...



View the original article here

Share |

Election Security Risks, Potential Voting Failures Loom

Most American voters can recall the drawn-out election recount of the 2000 presidential election, when the disputed outcome of Florida's electoral tally resulted in a legal and procedural battle that was not concluded until mid-December.

View the original article here

Share |

Huawei security chief says embracing its hacker critics

By Jeremy Wagstaff and Lee Chyen Yee NEW DELHI/HONG KONG (Reuters) - Under-fire Chinese telecoms equipment vendor Huawei Technologies Co Ltd is reaching out to one of its sternest critics: a hacker who ...

View the original article here

Share |

Apple drops Java after experts warn Mac users on its security

The logo of Apple is seen on a product displayed at a store in SeoulBOSTON (Reuters) - Apple Inc is removing old versions of Oracle Corp's Java software from Internet browsers on the computers of its customers when they install the latest update to its Mac operating system. Apple, which has previously included Java with installations of Mac OS X, announced the move on its support site. It said that customers need to obtain Java directly from Oracle if they want to access web content written the widely used programming language. (http://support.apple.com/kb/DL1572) Apple did not provide a reason for the change and both companies declined to comment. ...



View the original article here

Share |

How Windows 8 Changes the Game for PC Security

How Windows 8 Changes the Game for PC SecuritySecurity, or lack thereof, has dogged Microsoft Windows since the mid 1990s. This was bad news for consumers who were fond of risky practices like sharing 3.5-inch floppies and downloading unknown files from services like AOL, UseNet Groups and, later, the web and file-sharing services. It was a boon, though, for a legion of security software companies that all dove into the breach to protect us from a vulnerable operating system and ourselves.



View the original article here

Share |

Apple drops Java after experts warn Mac users on its security

The logo of Apple is seen on a product displayed at a store in SeoulBOSTON (Reuters) - Apple Inc is removing old versions of Oracle Corp's Java software from Internet browsers on the computers of its customers when they install the latest update to its Mac operating system. Apple, which has previously included Java with installations of Mac OS X, announced the move on its support site. It said that customers need to obtain Java directly from Oracle if they want to access web content written the widely used programming language. (http://support.apple.com/kb/DL1572) Apple did not provide a reason for the change and both companies declined to comment. ...



View the original article here

Share |

LinkedIn sheds more light on security breach

SAN FRANCISCO (Reuters) - LinkedIn Corp, criticized for inadequate network security after hackers exposed millions of its users' passwords, said on Saturday it had finished disabling all affected accounts and did not believe other members were at risk. The company, a social network for business professionals, promised to beef up security, days after more than 6 million customer passwords turned up on underground sites frequented by criminal hackers. ...

View the original article here

Share |

Security Firm Symantec Analyzes the Profitability of the OSX.Flashback Botnet

Security firm Symantec previously estimated that the authors of the Flashback malware that affected hundreds of thousands of Macs at its peak could have been generating up to $10,000 per day by hijacking users' ad clicks. Further analysis from the company suggests that the developers may have only earned $14,000 over the three weeks the malware was active.

From our analysis we have seen that, for a three-week period starting in April, the botnet displayed over 10 million ads on compromised computers but only a small percentage of users who were shown ads actually clicked them, with close to 400,000 ads being clicked. These numbers earned the attackers $14,000 in these three weeks, although it is worth mentioning that earning the money is only one part of the puzzle—actually collecting that money is another, often more difficult, job. Many PPC providers employ anti-fraud measures and affiliate-verification processes before paying. Fortunately, the attackers in this instance appear to have been unable to complete the necessary steps to be paid.

It is estimated the actual ad-clicking component of Flashback was only installed on about 10,000 of the more than 600,000 infected machines. In other words, utilizing less than 2% of the entire botnet the attackers were able to generate $14,000 in three weeks, meaning that if the attackers were able to use the entire botnet, they could potentially have earned millions of dollars a year.
Symantec notes that the malware developers displayed more than 10 million hijacked ads and could have delivered many more if the developers had been more successful in their attacks.

Some security specialists have said that the Mac OS is "really vulnerable" to further infections, though these claims should perhaps be taken with a grain of salt -- those security specialists make their living off vulnerabilities and it is in their best interest to promote awareness of them.



View the original article here

Share |

Gamefbi - Find me on Bloggers.com