Cyber Defense

Drudge Report Delivers Malware, CNET Report Shows

NEW YORK - For the second time in less than six months, visitors to the Drudge Report say they got malware in addition to the Web site's usual sensational headlines. Matt Drudge denied that his site was infecting visitors, however it's likely that the malware is coming from ads delivered by a third-party ad network

By |2010-03-09T00:00:00-05:00March 9th, 2010|Archive, Cyber Defense|

Software Security Top Priority For Enterprises

SAN FRANCISCO - Fortify Software has announced the results of a straw poll taken at the RSA Conference 2010. Based on an informal survey of 200 security professionals in attendance, Fortify's poll sought to assess the general awareness of the risk associated with insecure software, as well as the adoption of software security solutions within

By |2010-03-09T00:00:00-05:00March 9th, 2010|Archive, Cyber Defense|

Phishing, Document-Related Threats Rising Dramatically: IBM

NEW YORK - IBM has released results from its annual IBM X-Force 2009 Trend and Risk Report. The report's findings show that existing threats such as phishing and document format vulnerabilities have continued to expand, despite the fact that clients have generally made strides to improve security. The IBM X-Force 2009 Trend and Risk Report

By |2010-02-25T00:00:00-05:00February 25th, 2010|Archive, Cyber Defense|

Dan Lohrmann ? Michigan Goes Cloud Computing

LANSING ? Dan Lohrmann, chief technology officer for the State of Michigan, and Director of Infrastructure Services, says the state is rapidly moving towards a cloud computing infrastructure to store, and retrieve, most state records. To listen, click on MITechNews.JenesysGroup.Com a>>

By |2010-02-12T00:00:00-05:00February 12th, 2010|Archive, Cyber Defense|

Netarx Technology Bar Open House March 11 Features Virtualization

AUBURN HILLS ? Netarx is hosting a technology bar open house on March 11 at its Auburn Hills headquarters to provide updates on virtualization from its strategic partners Microsoft and VCE. The event is free, but does require advance registration. Food from Lukich's Family Dining.Wine, Beer, and Soft Drinks. Giveaways and Door Prizes. WHEN: Thursday,

By |2010-02-11T00:00:00-05:00February 11th, 2010|Archive, Cyber Defense|

Google Chrome For Windows Gets 3 Critical Security Fixes

MOUNTAIN VIEW - The stable version of Google Chrome for Windows has been updated with three critical security fixes and an announcement that the first payouts to crowd-sourced security researchers have been delivered. Chrome 4.0.249.89 repairs serious problems found in processing the tag, and two integer overflows that affected the JavaScript engine

By |2010-02-11T00:00:00-05:00February 11th, 2010|Archive, Cyber Defense|

Criminals Give Ringing Endorsement Of Cloud Computing Technology

LONDON - Executives unsure of the viability of cloud computing need look no further than the criminal fraternity for a ringing endorsement of the technology, according to a security expert. Cloud computing has been enthusiastically taken up by criminals for a range of activities, Rik Ferguson, senior security adviser at security firm Trend Micro, told

By |2010-02-11T00:00:00-05:00February 11th, 2010|Archive, Cyber Defense|

Apple’s iPad Has Same Security Issues As iPhone

CUPERTINO, Ca. - Apple's new iPad device looks like it will have some of the same security issues that affect the iPhone, such as weak encryption, a mobile security expert said. For one, if the iPad employs encryption the same way the iPhone does, sensitive personal data, including phone numbers and e-mail addresses, could be

By |2010-02-11T00:00:00-05:00February 11th, 2010|Archive, Cyber Defense|