Cyber Defense

What CEOs Don’t Know About Cybersecurity

NEW YORK - A study released Tuesday by the privacy-focused Ponemon Institute, companies' chief executives tend to value cybersecurity just as - if not more - highly than their executive colleagues. But compared to lower-level execs, CEOs also tend to underestimate the frequency of cyberthreats their organization faces. The survey, which was funded by cybersecurity

By |2009-07-13T00:00:00-04:00July 13th, 2009|Archive, Cyber Defense|

Report: Social Security Numbers Can Be Predicted

WASHINGTON DC - It is possible to use publicly available data on state and date of birth to predict someone's Social Security number, particularly if they were born after 1988 and in smaller states, according to an article published Monday in The Proceedings of the National Academy of Sciences. The ability to use statistic inference

By |2009-07-07T00:00:00-04:00July 7th, 2009|Archive, Cyber Defense|

ERT Systems Updates Emergency Resource Tracking Software

ANN ARBOR - ERT Systems, which makes automated tracking systems for first responders, has released P.A.R. Version 4, an enhanced version of its emergency resource tracking and scene management software. "Version 4 adds a number of new features which greatly improve ease-of-use and overall scene management," said Dennis Carmichael, President of ERT Systems. "They include

By |2009-06-21T00:00:00-04:00June 21st, 2009|Archive, Cyber Defense|

Cyber Criminals Buy And Sell Botnets At Trading Platform

TORONTO - Cyber-criminals continue to show just how enterprising they can be. Finjan's Malicious Code Research Center has discovered a trading platform that enables cyber-criminals to buy and sell botnets - essentially a one-stop shop for such activity. In its research, Finjan's MCRC discovered the existence of the Golden Cash network, which consists of a

By |2009-06-21T00:00:00-04:00June 21st, 2009|Archive, Cyber Defense|

Microsoft To Announce Azure Cloud-Computing OS Next Month

REDMOND, Wa. - Microsoft plans to announce next month more of the business details behind its Windows Azure operating system, a cloud-based operating system. The software maker unveiled the operating system at a developer conference last year. It has said that some of the services, currently in free testing, will be released in final form

By |2009-06-16T00:00:00-04:00June 16th, 2009|Archive, Cyber Defense|

New Malware Attack Infecting Web Sites

SAN DIEGO - Security firm Websense has put out an advisory warning Web site owners about malicious code that redirects surfers to seemingly safe sites. About 40,000 Web sites appear to have been compromised with rogue JavaScript code that redirects Web surfers to a fake Google Analytics site, after which they get passed onto a

By |2009-06-10T00:00:00-04:00June 10th, 2009|Archive, Cyber Defense|

Scammers Using Search Optimization On Twitter, Google

SEATTLE - Online scammers are targeting people looking for popular topics on Twitter and Google to lure them to Web sites that display fake security warnings and try to sell them antivirus products, PandaLabs reported. This technique isn't new, but seems to be widening on Google and is particularly successful on Twitter where links are

By |2009-06-10T00:00:00-04:00June 10th, 2009|Archive, Cyber Defense|

McAfee’s To Offer New Family Shield Security Protection

MOUNTAIN VIEW, Ca. - On the heels of Symantec's OnlineFamily.Norton, released earlier this year, security stalwart McAfee is jumping into the family protection game with a new home-oriented protection program. Called McAfee Family Protection, the program will offer many familiar tools to parents in the hopes of fostering conversation while protecting children from harm. McAfee

By |2009-06-10T00:00:00-04:00June 10th, 2009|Archive, Cyber Defense|

Channel On The Hook For Security Breaches?

SAN FRANCISCO - Information security managers and executives have long been held accountable for security incidences and breaches, but what about the people who certify or provide the security? In other words, should auditors and managed security service providers be held accountable for breaches that happen after they've signed off on security measures? That is

By |2009-06-10T00:00:00-04:00June 10th, 2009|Archive, Cyber Defense|