Business Dimensions with Deborah Burns features Net Sciences on KKOB radio
Listen to the show
Listen to the show
The days of feeling secure by simply performing packet inspection at your network edge are long past. These SPI (stateful packet inspection) devices or firewalls were the first generation of network security that many of us first experienced in the ...
http://windowsitpro.com/windows-xp/voice-grave-high-number-windows-xp-users-were-just-unaware
http://money.cnn.com/2014/04/08/technology/security/windows-xp
Microsoft said yesterday (3/24/14), that users of Word 2010 (and to some extent, other versions) are under active attack "in the wild" (that is, in real life). There is a temporary "fix" available, see content of the linked article for ...
Attackers used phishing and zero-days to infect Windows, Mac, and Linux users. by Dan Goodin - Feb 10 2014, 2:33pm MST Calling it the most sophisticated malware-driven espionage campaign ever discovered, researchers said they have uncovered an attack dating back ...
You probably haven’t heard of HD Moore, but up to a few weeks ago every Internet device in the world, perhaps including some in your own home, was contacted roughly three times a day by a stack of computers that ...
Organized hackers in Ukraine and Russia stole more than $1 million from a public hospital in Washington state earlier this month. The costly cyberheist was carried out with the help of nearly 100 different accomplices in the United States who ...
In itself, a distributed denial of service, or DDoS, attack on a bank's website is little more than costly hooliganism. It essentially consists of hackers ordering a bunch of infected computers to "click" on a bank's website until it's too ...
IDG News Service - Researchers from security firm FireEye claim that attackers are actively using a remote code execution exploit that works against the latest versions of Adobe Reader 9, 10 and 11. Read The Full Article