Cyber Defense

The New Look Of Mobile Security

BURLINGAME, Calif. - A start-up called Lookout is trying to make phones safer and views itself as the "Symantec or McAfee of the mobile space." In 2010, the company will offer software that can scan phones to determine which apps are safe and which are not. "Applying PC solutions to a mobile problem just won't

By |2009-12-22T00:00:00-05:00December 22nd, 2009|Archive, Cyber Defense|

Sex, Porn, Jacko Top Kids’ Searches In 2009

SAN FRANCISCO - Sex, porn, and Michael Jackson were among the most popular items kids searched for online in 2009, as tracked by Symantec's OnlineFamily.Norton. Symantec on Thursday revealed the top 100 favorite search terms among children 18 and under found by its free OnlineFamily.Norton service, which helps parents monitor their kids' online searches, CNET

By |2009-12-19T00:00:00-05:00December 19th, 2009|Archive, Cyber Defense|

Predator Drones Hacked In Iraq Operations

BAGHDAD - Iraqi insurgents have reportedly intercepted live video feeds from the U.S. military's Predator drones using a $25.95 Windows application that allows them to track the pilotless aircraft undetected. Hackers working with Iraqi militants were able to determine which areas of the country were under surveillance by the U.S. military, The Wall Street Journal

By |2009-12-19T00:00:00-05:00December 19th, 2009|Archive, Cyber Defense|

Firefox 3.5.6 Patches Critical Security Holes

MOUNTAIN VIEW - Mozilla has updated its Firefox browser to patch three critical security holes. Firefox 3.5.6 and 3.0.16 both fix earlier memory corruption issues. "We presume that with enough effort at least some of these could be exploited to run arbitrary code," the security advisory said. In addition, the earlier version of Firefox 3.5

By |2009-12-17T00:00:00-05:00December 17th, 2009|Archive, Cyber Defense|

Top Five Security Challenges Of 2010

POPT FALLS, Idaho - Social networking sites like Twitter, LinkedIn, Facebook and MySpace will pose one of the biggest threats in 2010, according to TriGeo Network Security, a provider of security information and event management technology for midmarket enterprises. "Employees tweeting and chatting online are inadvertently handing hackers the 'inside' information that they need to

By |2009-12-15T00:00:00-05:00December 15th, 2009|Archive, Cyber Defense|

Walsh College Hosts Meetings For DOD Information Assurance Scholarship

TROY - On January 7 and January 18, Walsh College will hold informational meetings at regarding a U.S. Department of Defense-funded scholarship for concentrated studies in information assurance. The meetings will be held at the Troy campus at 5 p.m. Room to be determined. February 12 is the deadline to apply for the scholarships, available

By |2009-12-11T00:00:00-05:00December 11th, 2009|Archive, Cyber Defense|

TWITTER PITCH: Join In Recognizing The Importance Of Computing During CSEdWeek

WASHINGTON, D.C. - The Association for Computing Machinery and its partners are launching Computer Science Education Week (CSEdWeek) to uncover and remedy the inadequacy of the nation's computer science education system at the K-12 level. While five of the top 10 fastest growing jobs are in computing-related fields, the percent of schools with rigorous high

By |2009-12-11T00:00:00-05:00December 11th, 2009|Archive, Cyber Defense|

IS Students Showcase Capstone Projects December 12

TROY - A robotics lab grant proposal is among 18 student projects that will be showcased on Saturday, Dec. 12, at the Walsh College Business Information Technology and Information Assurance Capstone Fair at the Troy campus. The fair, which is free to the public, will be held from 10 a.m. to 1 p.m. in Room

By |2009-12-11T00:00:00-05:00December 11th, 2009|Archive, Cyber Defense|

Afghan National Security Forces – A Primer For Selling Security Products

WASHINGTON DC - If the US and NATO are to succeed in reducing their involvement in Afghanistan and embark on an effective exit strategy, developing and cultivating the Afghan National Army is a top priority. Through the Combined Security Transition Command-Afghanistan, US forces and allied forces and contractors will continue training the ANSF. CSTC-A is

By |2009-12-11T00:00:00-05:00December 11th, 2009|Archive, Cyber Defense|