5:55 pm, January 26, 2015

Search Result

Search Tags:  Adobe

USAF cybersecurity unit ready to launch

Established in August, the San Antonio cybersecurity center will be launching by the end of the year.

Tags: Cybersecurity Update , cybersecurity , cyberwarfare , USAF , Red Condor , NIST , iris recognition

Monday - 11/30/2009, 07:59am EST

The other 'Soup Nazi' goes to jail

Miami hacker known as "soupnazi" pleads guilty to one of largest cyberthefts in U.S. history.

Tags: cybersecurity , Albert Gonzalez , soupnazi , segvec , cybertheft , McAfee , Microsoft , Justice , DoJ , Acrobat Reader , threat prediction

Wednesday - 12/30/2009, 08:40am EST

DARPA heads to the National Cyber Range

New cyber testing ground gets underway, Google may leave China, Adobe issues zero-day patch.

Tags: Cybersecurity Update , cybersecurity , DARPA , Google , China , Lockheed , contracting , Johns Hopkins University

Wednesday - 01/13/2010, 09:20am EST

Programmers blamed for cyberattacks

Programming errors are the chief cause of cyber attacks, Adobe applications accounted for 80 percent of hacker exploits.

Tags: Cybersecurity Update , cybersecurity , DHS

Wednesday - 02/17/2010, 09:00am EST

Adobe patches Illustrator security holes

Adobe has released security updates for critical vulnerabilities in Adobe Illustrator CS4 (14.0.0) and Adobe Illustrator CS3

Tags: Cybersecurity Update , Cybersecurity Workforce , Information Integration Program

Friday - 01/08/2010, 07:46am EST

Forbes lists the year's most-hacked software

And the return of Koobface

Tags: Cybersecurity Workforce , cybersecurity , Forbes , Java , sunsystems , Koobface

Friday - 12/11/2009, 09:02am EST

Google cyberhacks used new IE hole

Microsoft has admitted that its Internet Explorer was a weak link in the recent attacks on Google's systems that originated in China; and Conficker still out there.

Tags: Cybersecurity Update , cybersecurity , Internet Explorer , Google , Microsoft , Conficker

Friday - 01/15/2010, 08:49am EST

Wu: Cybersecurity Czar shouldn't be a 'eunuch'

Chair of the House Science and Technology Committee's Subcommittee on Technology and Innovation says Cybersecurity Czar plans lack punch.

Tags: Cybersecurity Update , Cybersecurity Workforce , House Science and Technology Committee , Subcommittee on Technology and Innovation , David Wu , tech , security patch

Thursday - 12/17/2009, 09:11am EST

USGS maps for a new generation

US Topo maps provide technical advantages that support faster, wider public distribution and enable basic, on-screen geographic analysis for all users.

Tags: tech , USGS , National Geospatial Technical Operations Center , Kari Craun , TerraGo , Google , partnership , best practices

Monday - 12/14/2009, 09:30am EST

H1N1 inspires palm-vein biometrics

Palm-vein biometrics uses near-infrared light to capture palm-vein patterns in a person's hand, which serves as their identity to the systems. A user would hold his hand over a small scanning device attached to his computer that reads the pattern and matches it to a database of preregistered users. Unlike fingerprint scanning, palm vein is contactless, meaning the user doesn't touch any devices and risk leaving behind a "footprint" fingerprint that could be accessed or stolen.

Tags: Cybersecurity Update , cybersecurity , tech , I Fund , Fujitsu , H1N1 , Twitter

Monday - 12/21/2009, 08:36am EST
  • 2