Latest News
SQL Injection - Security of your website information is probably the most important thing. If your database contains valuable data, you might lose your data or your data could be stollen. Not every web developer has heard about SQL Injection. ... - more info
Boost the security of your Apache Geronimo applications with SSL ... - You can't get very far into Web application development without discovering the need for varying levels of security. And when it's time to pass around sensitive or private data, you need to look at encrypting that data. ... -
Identity theft in the large - That is data pertinent to the running of the business. ... But what about the members of the public who have their data compiled into these vast databases ... responsibility attached to the database compilers lack of adequate security. ... - more info
GS(3) Intel Brief 10-13-06: Updates on Energy Security ... - NOTE: Words of Power explores the interdependence of security, sustainability and spirit. ... the pursuit of energy security and environmental security, ... compared with 12 percent of the world's land, according to UN data. ... - more info
SSL: Site Security And Privacy - As an online marketer you will likely be asking your visitors for personal data. Don't be surprised if your potential customer determines their willingness to do business with you based on the security of your website. ... - more info
Online Hacker Forums - ... and sellers convene at these virtual emporiums to wheel and deal in all things related to cyberattacks — and in the fruit of cyberintrusions: pilfered credit and debit card numbers, hijacked bank accounts and stolen personal data. ... - more info
Encrypted Drives and Virtual Machine Images - In this day and age, almost anyone can invade your computer system and steal your data. This makes it all the more essential to ensure that beyond your perimeter network security barrier, you have a line of defense inside your system. ... - more info
Universtity of Texas at Arlington: Mavericks get ripped off! - Data contained: The computers contained class rosters with student Social Security numbers, grades, e-mail addresses and other information. Additional Notes: Computers stolen from a faculty member’s home ... - more info
Florida Dept. of Labor: Guys, this is a little TOO MUCH sunshine… - Additional Notes: The names and Social Security numbers made it online around Sept. 1, when a workforce agency staffer in Tallahassee was uploading information to a “test server” and accidentally included the confidential data. ... - more info
SEA Airport: SEA airport run. SEA airport lose disks… - Data contained: Personal information - including name, date of birth, driver’s license and Social Security numbers, addresses, height and weight. Additional Notes: The port discovered the disks were missing on September 18. ... - more info
Pinging to get some really useful data - MailChannels is pinging the world's mail servers -- Netcraft-style. This article describes some of the early results. -
Protect sensitive Web site data by encrypting information with MySQL - Securing this data from hackers or snoopers is a critical concern, ... with a variety of encryption functions designed to offer you just this type of security. ... of how they can be used and the differing levels of security they offer. - more info
Absolutely, more control over my data contained... - Absolutely, more control over my data contained on Google's servers would be a great idea. As mentioned above, it would be worth paying for. ... I'd like to see more stringent security when logging in with a google ID. priznat. -
Global Technology Audit Guide - Managing and Auditing IT ... - I also know that many of the reporting features we've put into the Security Center came as requests directly from customers who had to produce reports and data similar to what the GTAG is asking. - more info
Why is there no Google Data Privacy management section? - A guy asks the question of why is it that Google talks about giving more control to the user, but don't give you the option of controlling how to use your user account. Isn't that at least the one thing you should be able to control? -
If the Police have to consult "community representatives" before ... - The Association of Chief Police Officers is currently considering this: and they and MI5 and the Home Office are considering whether or how to release security data to the panel members. Panel members will promise not to reveal such ... - more info
Jeremy Burton Group President, Security and Data Management - Sarbanes-Oxley Compliance Journal, NJ - Oct 9, 2006… group president, Security and Data Management Group, Symantec … The knowledge and empirical data from those efforts were … a Dell-designed sizing tool that enables … ... - more info
It’s the information, stupid - Symantec Shifts Focus to Data Security Symantec is expanding its focus from securing devices to protecting information, the company said at an event in New York. Dubbed Security 2.0, the new initiative will seek to restore consumer ... - more info
Disk encryption with Microsoft's Vista - Numerous pre-boot and system files, as well as temporary data, ... In many cases, valuable data on lost or stolen notebooks has not even been protected using EFS. A Windows password isn’t enough to prevent data theft using, for example, ... - more info
TSA aviation-security deal goes to Raytheon - A Transportation Security Administration contract was awarded to Raytheon Technical Services Company LLC, which will deliver a system that communicates data and images to airports in the US. -
How To Prevent The Next Data Recovery Incident - This way nothing ever gets lost and everything is backed up in a second place. Even if there's a fire in your office all the data is preserved. The disadvantages here are information security risks, as well as the costs involved. ... - more info
USB Hacking Tools - Steal data, install worms, get passwords and ... - Includes tools to steal data from systems, install worm like applications that send data via encrypted email to remote email accounts and more. If this doesn't scare the crap out of you and make you superglue your USB ports I don't know ... -
Identity Knight v1.4 - Identity Knight scans the IE AutoComplete data for credit card numbers, SSN, e-mails, ... finds such information, it allows you to choose the data to secure. ... ensures optimum security settings for any kind of computing environment. ... - more info
Lawmakers seek probe of Homeland Security data-mining project - Congressional appropriators have directed the Homeland Security Department's inspector general to investigate the $40 million ADVISE data-mining project, saying it appears to lack clear guidelines and oversight. Critics fear that ADVISE ... -
Just Released: Survey of Dept. of Homeland Security Data Mining ... - We surveyed the Department of Homeland Security (DHS) to identify and describe data mining activities used to support the counterterrorism mission. Data mining and advanced analytics are evolving technologies that assist in the ... - more info