New Mexico News - Page 44
Researchers Evolve New Mechanism to Improve Operating System Security
January 28, 2011
The security researchers have evolved an approach, which comprises of three elements - attack identification, isolation of the security flaw and recovery.
January 28, 2011
The security researchers have evolved an approach, which comprises of three elements - attack identification, isolation of the security flaw and recovery.
Cisco Warns Customers on Vulnerabilities in Content Service Gateway
January 28, 2011
Recently, security researchers at Cisco disclosed security flaws in its second generation content service gateway (CSG2). Content service gateways are used by organizations to offer access to content on their sites at a price.
January 28, 2011
Recently, security researchers at Cisco disclosed security flaws in its second generation content service gateway (CSG2). Content service gateways are used by organizations to offer access to content on their sites at a price.
Security Experts Warn against Growing Cybercrime Underground Market
January 28, 2011
The recent years have witnessed significant increase in cybercrime.Attackers now use well-crafted e-mails and stealth to deceive users.Attackers regularly scan the cyberspace to collect valuable personal information and initiate target based attacks.
January 28, 2011
The recent years have witnessed significant increase in cybercrime.Attackers now use well-crafted e-mails and stealth to deceive users.Attackers regularly scan the cyberspace to collect valuable personal information and initiate target based attacks.
Cyber Warriors Crucial to Combat Threats Emanating from the Cyberspace
January 24, 2011
A few months back, a U.S report indicated a shortage of at least 20,000 cyber experts. The country has since than organized competitions to shortlist potential cyber warriors.
January 24, 2011
A few months back, a U.S report indicated a shortage of at least 20,000 cyber experts. The country has since than organized competitions to shortlist potential cyber warriors.
Attackers Intrude into University of Sydney Website
January 21, 2011
University of Sydney has acknowledged the existence of a security flaw on the website, which caused leakage of confidential information related to students.
January 21, 2011
University of Sydney has acknowledged the existence of a security flaw on the website, which caused leakage of confidential information related to students.
Network Security is Crucial to Ensure Protection against Vibrant Attacks
January 20, 2011
A recent report by security firm Secunia indicates that network vulnerabilities will continue to haunt users and network administrators.
January 20, 2011
A recent report by security firm Secunia indicates that network vulnerabilities will continue to haunt users and network administrators.
Hacker Halted USA Returns to Miami - October 21-27, 2011
January 19, 2011
The premiere East Coast information security conference and training event will again be held in Miami, Florida as the EC-Council returns to the South with Hacker Halted USA. 2011 marks the third consecutive year the conference has been held in Miami
January 19, 2011
The premiere East Coast information security conference and training event will again be held in Miami, Florida as the EC-Council returns to the South with Hacker Halted USA. 2011 marks the third consecutive year the conference has been held in Miami
ENISA Reviews Data Breach Notification Rules to Address Concerns in Implementing ePrivacy directive
January 19, 2011
The concerns of telecom companies and data protection authorities relate to lack of risk prioritization, mode of communication, reporting deadlines and notification content among others.
January 19, 2011
The concerns of telecom companies and data protection authorities relate to lack of risk prioritization, mode of communication, reporting deadlines and notification content among others.
Authentication Tokens from Banks Make Mobile Phones Susceptible to Attacks
January 18, 2011
Bank customers are required to enter the security token number to complete third party payments through Internet banking.
January 18, 2011
Bank customers are required to enter the security token number to complete third party payments through Internet banking.
University of Connecticut Warns Customers on Data Breach
January 13, 2011
The database contains records of around 18,000 customers and includes information such as names, credit card numbers, expiration dates, customer security number, mailing addresses, telephone numbers and e-mail ids.
January 13, 2011
The database contains records of around 18,000 customers and includes information such as names, credit card numbers, expiration dates, customer security number, mailing addresses, telephone numbers and e-mail ids.