InfoSec News

Nearly a month after a Google engineer released details of a new Windows XP flaw, criminals have dramatically ramped up online attacks that leverage the bug.
 
Just over two months after launching it, and days after reducing the price, Microsoft has decided to kill the Kin phone.
 
Just over two months after launching it, and days after reducing the price, Microsoft has decided to kill the Kin phone.
 
Just over two months after launching it, and days after reducing the price, Microsoft has decided to kill the Kin phone.
 
Amazon.com plans to acquire online discount retailer Woot.com, the smaller site announced Wednesday.
 
Russian spies allegedly used steganography, open wireless networks and transfer of memory sticks to swap data, but faced problems such as leaving a password lying around on a piece of paper and trouble getting laptops fixed in less than six months.
 
MeeGo, a Linux project combining Intel and Nokia software, released an early version of the mobile phone OS to developers on Wednesday.
 
The uproar over the iPhone 4's call reception, and Apple's suggestion that users slap cases around their new phones, has delayed shipments of the company's own 'bumper' casings and driven up prices on eBay.
 
Open-source ERP software may represent a small chunk of the overall market, but as a concept it has clearly gained a critical mass of adherents.
 
Targeted attacks like Operation Aurora require organizations to change up their security strategy, experts say

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google

Operation Aurora - Security - Targeted threat - Business - Google
 
The iPhone is holding its lead over Android devices, but the sheer number of new Android phones available could start to change that, according to a monthly report -- potentially the last of its kind -- from AdMob.
 
Facebook has revamped the way its users share information with third-party applications and Web sites in an effort to make the process easier, the company said.
 
The Blu-ray Disc Association is stepping away from movie distribution with the latest Blu-ray format, instead focusing on data backup and recording of high-definition broadcast content, the association said on Wednesday.
 
Intel is creating a new research lab dedicated to helping scientists figure out how people will use computers in the future.
 
Don't jump to conclusions about Windows 8 based on leaked slides supposedly from Microsoft, Michael Cherry, an analyst with Directions on Microsoft, warned today.
 
Just a day after Google moved to accommodate the Chinese government, the search firm reported that its service is being partially blocked in China.
 
Mark Gibbs reviews a clever Android-based e-book reader that does a whole lot more.
 
Microsoft has released a controller for its Silverlight multimedia software that can present dynamic visual summaries of large data sets in Web browsers.
 
Heartland Payment Systems, the victim last year of a massive data breach, vowed to develop new security gear based on end-to-end encryption to prevent such a breach from occurring again. That's now taking shape, but slowly.
 
Amazon.com suffered a significant breakdown on Tuesday that lasted for hours and affected core e-commerce functionality on its main site.
 

Public Key, Private Key, Secret Key: Everyday Encryption
CIO
That's #2 of my "big infosec certifications" (CISSP last year being the first) One thing I found in the exam prep classes for both certifications was that ...

 
Verizon Business Wednesday said it has begun a field trial of a set of hosted business services based on technology from Cisco Systems.
 
Just a day after Google moved to accommodate the Chinese government, the search firm reported that its service is being partially blocked in China.
 
The mobility and remote-access boom is technology powered but business driven. As small and midsize businesses (SMB) increasingly look toward technology to help them rebound in 2010, improved mobility solutions, greater employee productivity and a growing social media presence are all key strategies. Empowering employees with remote access can help SMBs thrive -- allowing them to improve customer service and add agility to their business model.
 
This article is the third in a series of how-to stories on building a computer. For a video version of part three, click here.
 
Cisco this week expanded its data center arsenal with software, switches, modules and services all designed to scale the infrastructure to meet the demanding needs of virtualization, application complexity and cloud computing.
 
Adobe has patched 17 critical vulnerabilities in Reader and Acrobat, including one that hackers have been using for nearly a month to commandeer PCs.
 
This article is the second in a series of how-to stories on building a computer. For a video version of part two, click here.
 
Samsung's new line of Galaxy S phones will be carried by all the major U.S. carriers.
 

Information Assurance Officer,London/Bristol,security,RMADS,GSI
news.careerstructure.com
Experience of the Accreditation process in accordance with HMG Infosec Assurance Standard No.2 (IS2). Experience of conducting Risk Assessments in ...

 
Apple's iOS 4 enables multitasking and other new and useful features, but the iPad can't join the party until this fall. If you jailbreak your iPad, however, you can multitask today--and that's just the beginning.
 
YouTube engineers say they still prefer Flash over HTML5, just the opposite of what developers at parent firm Google said last week.
 
Google must restore the Adwords account of Navx within five days and allow the company to place ads again, the French competition authority ruled Wednesday, finding that Google had discriminated against Navx.
 
Hearsay in recent days that Google is working hard on a project to better compete against Facebook has captured the attention of industry observers, who wonder what shape this initiative might take and what is its likelihood of success.
 
The problem with Web-based e-mail is that Windows doesn't understand it. Right-click a file and select Send to and then Mail recipient, and Windows will open up whatever e-mail client happens to be installed as the default on your computer--even if you never use it. The same thing happens if you try to mail a file from Word, WinZip, or any other program with a similar feature. That is, unless you've installed and set up Affixa (free), which becomes Windows default mail program.
 
Many of the best new features in Office 2010 were designed with mobile users and far-flung work groups in mind
 
Sometimes you have one of those eureka! moments and need to jot down your great idea. If you don't have a pen and paper handy, fear not- you can use most iPod models to record voice memos without breaking your train of thought.
 
The Mac gives you different ways to do the same thing: for instance, you can use a standard menu, a contextual menu, or a keyboard command to trigger the same action. So, it's easy to overlook the fact that the various ways you can trigger a Finder search actually have different results, providing different starting points in your search window. Learn the differences, and start your searches off on the right foot every time instead of slowly clicking your way to the options you need.
 
More than half a million Sony laptops sold this year contain a software bug that could lead them to overheat, the company said Wednesday.
 
The news Cius tablet computer is the latest example of the increasing product diversity of Cisco Systems, which launched more than 400 products last year alone.
 
More than half a million Sony laptops sold this year contain a software bug that could lead them to overheat, the company said Wednesday.
 
Get Android news, reviews, analysis and more with complete Computerworld coverage.
 
Most top hospital CIOs fear they won't meet 'meaningful use' standards for deploying e-health records and say the government has made its criteria too ambiguous, according to a survey by PricewaterhouseCoopers.
 
Reading on the iPad is a joy, and writing can be too. Here are eight apps -- and a few tips -- that can make both experiences even better.
 
InfoSec News: No Dark Corners: A Different Answer to Insider Threats: http://www.hsaj.org/?article=6.2.5
By Nick Catrantzos Homeland Security Affairs The Journal of the Naval Postgraduate School Center for Homeland Defense and Security Volume VI No. 2: May 2010
An adversary making a frontal attack can be anticipated or repulsed. [...]
 
InfoSec News: Destination Hotels card-processing system hacked: http://www.computerworld.com/s/article/9178695/Destination_Hotels_card_processing_system_hacked
By Robert McMillan IDG News Service June 29, 2010
Hackers have broken into the payment processing system of Destination Hotels & Resorts, a high-end chain best known for its resort hotels in [...]
 
InfoSec News: Security Managers Report Weak Threat Defenses: http://www.informationweek.com/news/security/intrusion-prevention/showArticle.jhtml?articleID=225701797
By Mathew J. Schwartz InformationWeek June 29, 2010
According to a new survey conducted by Ponemon Institute and sponsored by NetWitness, 83% of information security professionals said their [...]
 
InfoSec News: Adobe Reader, Acrobat updates fix 17 critical holes: http://news.cnet.com/8301-27080_3-20009190-245.html
By Elinor Mills InSecurity Complex CNet News June 29, 2010
Adobe on Tuesday released updates for Reader and Acrobat that plug 17 critical holes, including one being exploited in the wild to take [...]
 
InfoSec News: UM Counseling Center servers hacked: http://mainecampus.com/2010/06/29/um-counseling-center-servers-hacked/
By Michael Shepherd The Maine Campus June 29th, 2010
University of Maine police are investigating the breach of two UMaine computer servers holding the names, social security numbers, and [...]
 
InfoSec News: Meet the FBI's new top cyber cop: http://fcw.com/articles/2010/06/28/feat-qanda-gordon-snow-fbi.aspx
By Ben Bain FCW.com June 23, 2010
As the FBI's top cyber cop, Gordon Snow is on the front lines of federal efforts to thwart cyber crime, espionage and potential online terrorist activity. [...]
 

Posted by InfoSec News on Jun 29

http://www.hsaj.org/?article=6.2.5

By Nick Catrantzos
Homeland Security Affairs
The Journal of the Naval Postgraduate School Center
for Homeland Defense and Security
Volume VI No. 2: May 2010

An adversary making a frontal attack can be anticipated or repulsed. An
adversary attacking from within, however, cannot be so readily
countered. This article presents findings of research that used a Delphi
method to uncover flaws in traditional...
 

Posted by InfoSec News on Jun 29

http://www.computerworld.com/s/article/9178695/Destination_Hotels_card_processing_system_hacked

By Robert McMillan
IDG News Service
June 29, 2010

Hackers have broken into the payment processing system of Destination
Hotels & Resorts, a high-end chain best known for its resort hotels in
destinations such as Vail, Colorado; Lake Tahoe, California; and Maui,
Hawaii.

Guests who recently stayed at 21 of the resort's 30 hotels may have been...
 

Posted by InfoSec News on Jun 29

http://www.informationweek.com/news/security/intrusion-prevention/showArticle.jhtml?articleID=225701797

By Mathew J. Schwartz
InformationWeek
June 29, 2010

According to a new survey conducted by Ponemon Institute and sponsored
by NetWitness, 83% of information security professionals said their
organization has been recently targeted by advanced threats, and 71%
report that such attacks have increased in the past 12 months.

But even as these...
 

Posted by InfoSec News on Jun 29

http://news.cnet.com/8301-27080_3-20009190-245.html

By Elinor Mills
InSecurity Complex
CNet News
June 29, 2010

Adobe on Tuesday released updates for Reader and Acrobat that plug 17
critical holes, including one being exploited in the wild to take
control of computers and one that could be used to launch an attack
using social engineering and PDF files.

Adobe warned about the vulnerability being used in attacks, which also
affected Flash...
 

Posted by InfoSec News on Jun 29

http://mainecampus.com/2010/06/29/um-counseling-center-servers-hacked/

By Michael Shepherd
The Maine Campus
June 29th, 2010

University of Maine police are investigating the breach of two UMaine
computer servers holding the names, social security numbers, and
clinical information of students who attended the university's
Counseling Center from Aug. 8, 2002 to June 21 of this year.

According to a university press release, data linked to...
 

Posted by InfoSec News on Jun 29

http://fcw.com/articles/2010/06/28/feat-qanda-gordon-snow-fbi.aspx

By Ben Bain
FCW.com
June 23, 2010

As the FBI's top cyber cop, Gordon Snow is on the front lines of federal
efforts to thwart cyber crime, espionage and potential online terrorist
activity.

Snow, who took over as FBI assistant director in charge of the bureau's
Cyber Division earlier this year, served in the Marine Corps for more
than 10 years and has a master's degree in...
 

Internet Storm Center Infocon Status