10:22 pm, May 28, 2015

Search Result

Search Tags:  cybersecurity report

Twitter worm outbreak

A new bug is attacking Twitter and you can catch it just by moving your cursor over a link.

Tags: Dorobek Insider , Twitter , worm , Cybersecurity Report

Tuesday - 09/21/2010, 04:42pm EDT

Spammers spread fake WikiLeaks links

InfoSecurity reports the spam is being spread in the "name of democracy", according to Kaspersky Lab's December 2010 spam report.

Tags: Kaspersky Lab , spam , WikiLeaks , Cybersecurity Report , technology , Dorobek Insider

Thursday - 02/03/2011, 01:26pm EST

Azmi: Supply chain forgotten element in cybersecurity

CACI International and the U.S. Naval Institute released a report national security and assessing cyber threats specifically on global supply chains.

Tags: technology , Zal Azmi , Cybersecurity , Cybersecurity Report , supply chain , best practices , In Depth , Francis Rose

Tuesday - 09/21/2010, 05:42pm EDT

Top agencies still at risk for cybersecurity attack

Senator Tom Carper of Delaware says the results from a new Government Accountability Office study are evidence that lawmakers should enact tougher rules to ensure the security of federal data -- like his bill -- Data Security and Breach Notification Act.

Tags: Cybersecurity , Cybersecurity Report , DorobekInsider , GAO , Tom Carper

Monday - 09/20/2010, 07:01pm EDT

Are you practicing safe social networking?

Cyber criminals have stolen the identity of some high ranking officials around the world, including the head of Interpol.

Tags: Cybersecurity , Cybersecurity Report , social networking , technology , DorobekInsider

Monday - 09/20/2010, 06:56pm EDT

Online Cybersecurity Program Proves Popular

A new online cybersecurity degree program - being offered by the University of Maryland this fall - saw the enrollment of over 200 students on just the first day it was offered. Graduates will be trained to defend against cyberattacks, from both technical and policy-setting standpoints. University officials anticipate thousands will enroll. Because the course work is completely online, most of the students enrolled are expected to be working professionals looking to change careers.

Tags: technology , Cybersecurity Report , Scott Carr

Wednesday - 07/21/2010, 04:21pm EDT

Most Vulnerable Programs Report

A new list of the most vulnerable programs from the first half of 2010 hardly leaves anyone out. The report from M-86 Security Labs shows computers using Internet Explorer or Adobe Reader might be especially at risk, and that more Java-based vulnerabilities are also being actively exploited. The report also finds that attackers are finding new ways to bypass malware detection mechanisms.

Tags: technology , Cybersecurity Report , Scott Carr

Wednesday - 07/21/2010, 04:19pm EDT

Protect Service Offered to Blackberry Users

A free service from the company Research In Motion now offers data and device protection for users of Blackberrys. It's called Protect, and for now is invite-only, and through a limited beta version, though the company plans to offer a more general, open beta later this year. It allows users to lock down their devices, and locate lost devices on a map. Reviewers with Information Week call it a credible option for smaller businesses and consumers.

Tags: technology , Cybersecurity Report , Scott Carr

Wednesday - 07/21/2010, 03:03pm EDT

Warnings Issued Over Phony Flash Update

Warnings have been posted about phony updates to the Abobe Flash program. Barracuda Networks says it found a number of compromised websites that take visitors to an official looking Flash update page. But, I-T experts say downloading the updates could infect a computer with malware. They offer a way to spot the fake pages; they only allows users to click on the "Continue" button. They warn, any updates must be taken directly from Adobe.

Tags: technology , Cybersecurity Report , Scott Carr

Wednesday - 07/21/2010, 03:01pm EDT

GSA Works to Boost Security in the Cloud

The General Services Administration is reiterating its promise to boost cybersecurity and privacy of cloud computing.

As part of the so-called FEDRAMP program, beginning this fall an interagency group will inspect vendors' cloud computing facilities to make sure they meet federal security standards. If the group certifies a cloud facility, agencies would be able to sign up for service without having to further inspect the facility.

Tags: technology , Cybersecurity Report , Cybersecurity , GSA , FedRAMP , cloud , Scott Carr

Friday - 07/09/2010, 11:13am EDT
  • 2