Information Security News: by author

135 messages starting Feb 04 08 and ending Feb 29 08
Date index | Thread index | Author index


InfoSec News

Home Office laptop and disc 'bought on eBay' InfoSec News (Feb 29)
Logins for 8,700 FTP servers found on sale InfoSec News (Feb 29)
DHS gives itself a 'C' for cybersecurity InfoSec News (Feb 29)
Hackers penetrate police email accounts InfoSec News (Feb 29)
ITL Bulletin for February 2008 InfoSec News (Feb 29)
Wheat trader for MF Global loses $141.5 million in unauthorized trading InfoSec News (Feb 29)
Healthcare organizations feeling cyberattacks growing InfoSec News (Feb 29)
Secunia Weekly Summary - Issue: 2008-9 InfoSec News (Feb 29)
Chip-and-PIN under attack InfoSec News (Feb 29)
Brazil's oil data mystery cracked InfoSec News (Feb 29)
EU-wide security project proposed InfoSec News (Feb 27)
Apple's Mac OS X Vulnerable To Networking Exploit InfoSec News (Feb 27)
That Wi-Fi network you thought was secure? It ain't InfoSec News (Feb 27)
'Out of office' messages turned into spam relays InfoSec News (Feb 27)
GAO Finds Data Protection Lagging InfoSec News (Feb 27)
IRS searches for hidden U.S. assets in Liechtenstein banks InfoSec News (Feb 27)
Security of data analyzed in study InfoSec News (Feb 26)
How Pakistan knocked YouTube offline (and how to make sure it never happens again) InfoSec News (Feb 26)
Constant patch releases force IT to adopt new processes InfoSec News (Feb 26)
Lawmakers ask agencies for data security update InfoSec News (Feb 26)
Lack of jobs is driving IT pros to malware InfoSec News (Feb 26)
Customs: Vista PCs are safe from encryption attack InfoSec News (Feb 26)
CanSecWest 2008 Mar 26-28 InfoSec News (Feb 25)
Police say computer crimes on the rise InfoSec News (Feb 25)
Computer security's dubious future InfoSec News (Feb 25)
How much does a data breach cost UK companies? InfoSec News (Feb 25)
Hackers turn Google into vulnerability scanner InfoSec News (Feb 25)
Whistle while you work InfoSec News (Feb 25)
The common cold of IT security InfoSec News (Feb 25)
TSA's CISO to join Unisys InfoSec News (Feb 22)
Researchers Crack BitLocker, FileVault InfoSec News (Feb 22)
The hands-free way to steal a credit card InfoSec News (Feb 22)
Secunia Weekly Summary - Issue: 2008-8 InfoSec News (Feb 22)
IT security controls partly blamed for SocGen debacle InfoSec News (Feb 22)
UAE banks invest in IT security on hacking fears InfoSec News (Feb 20)
DDOS Danger For Online Gambling Sites InfoSec News (Feb 20)
Government admits to 200 more laptop thefts InfoSec News (Feb 20)
Stolen laptop had data of over 171,000 Irish blood donors InfoSec News (Feb 20)
Black Hat Conference: Security Researchers Claim To Hack GSM Calls InfoSec News (Feb 20)
Update: Security issues scuttle Bain/Huawei bid for 3Com InfoSec News (Feb 20)
Book Review: Hacking: The Art of Exploitation, 2nd Edition InfoSec News (Feb 20)
Quebec police bust alleged hacker ring InfoSec News (Feb 20)
Retrofitting PCs with a standard configuration poses unique challenges InfoSec News (Feb 20)
Hackers Break Into GSAS Computer Network, Post Protected Content to Downloading Web Site InfoSec News (Feb 20)
Black Hat Descends on Washington InfoSec News (Feb 19)
Nation States' Espionage and Counterespionage InfoSec News (Feb 19)
Russian hosting network running a protection racket, researcher says InfoSec News (Feb 19)
Experts find fault with cyberdirective InfoSec News (Feb 19)
Buying security products is often a waste of money InfoSec News (Feb 19)
Former FEMA director Michael Brown talks disaster recovery -- including his own InfoSec News (Feb 19)
Hacking the lobby telephone InfoSec News (Feb 19)
Government still suffers from information insecurity InfoSec News (Feb 19)
Petrobras announces loss of top secret information InfoSec News (Feb 19)
SocGen serves as security warning InfoSec News (Feb 19)
Cyber pranksters aim for a SWAT team response InfoSec News (Feb 19)
Saboteurs may have cut Mideast telecom cables: UN agency InfoSec News (Feb 19)
Sexily-named hacker disgruntled by Microsoft InfoSec News (Feb 19)
Linux Advisory Watch: February 15th, 2008 InfoSec News (Feb 19)
University Pledges to Boost Tech Security InfoSec News (Feb 19)
Diplomatic crisis looms as French bugs 'discovered in UK Defence Minister's office' InfoSec News (Feb 19)
A 'high-tech lock pick' is upheld in Dorozhko insider trading case InfoSec News (Feb 15)
Major Linux security glitch lets hackers in at Claranet InfoSec News (Feb 15)
Laptop with more than 5, 000 patients' details stolen from hospital InfoSec News (Feb 15)
Even Spies Embrace China's Free Market InfoSec News (Feb 15)
Re: MayDay! MayDay! Ruskies reinvent cyber crime InfoSec News (Feb 15)
Secunia Weekly Summary - Issue: 2008-7 InfoSec News (Feb 15)
OMB does not support bill to update FISMA InfoSec News (Feb 15)
Friendly 'worms' could spread software fixes InfoSec News (Feb 15)
SAFECode on software assurance InfoSec News (Feb 14)
FBI warns of Valentine's Day 'Storm' InfoSec News (Feb 14)
Firms in proposed 3Com deal offer risk relief InfoSec News (Feb 14)
Multifunction Printers: The Forgotten Security Risk InfoSec News (Feb 14)
MayDay! MayDay! Ruskies reinvent cyber crime InfoSec News (Feb 14)
Microsoft's Patch Tuesday Includes 11 Security Bulletins InfoSec News (Feb 12)
5 things you need to know about laptop searches at U.S. borders InfoSec News (Feb 12)
Los Alamos National Lab improves information security InfoSec News (Feb 12)
FAA wants help becoming cybersecurity shared-services provider InfoSec News (Feb 12)
'Internet Security Awareness Forum' is launched InfoSec News (Feb 12)
Commentary - Are we making it easy for China? InfoSec News (Feb 12)
VoIP phone phreaked by security hole InfoSec News (Feb 12)
RIM blames BlackBerry outage on security infrastructure upgrade InfoSec News (Feb 12)
Did China spy on NASA? InfoSec News (Feb 12)
DNS Inventor Warns of Next Big Threat InfoSec News (Feb 12)
Pandemic Preparation: Regulatory Relief, Workforce Readiness Remain Open Questions InfoSec News (Feb 12)
BlackBerry Users Experience Service Outage InfoSec News (Feb 12)
Thievin' teen bot herder admits to infecting military computers InfoSec News (Feb 12)
Defence IT security ups server infrastructure InfoSec News (Feb 10)
Welcome to Cyberwar Country, USA InfoSec News (Feb 10)
UK teen is world's youngest certified ethical hacker (maybe) InfoSec News (Feb 10)
Encryption could make you more vulnerable, warn experts InfoSec News (Feb 10)
Chinese waging online spy war InfoSec News (Feb 10)
Illegal immigrant found cleaning Commons InfoSec News (Feb 10)
4th Cyber Security & Information Intelligence Research Workshop (CSIIRW-08) Call for Abstracts InfoSec News (Feb 10)
Storm worm 'making millions a day' InfoSec News (Feb 10)
Thief Scams Fortress D.C. InfoSec News (Feb 09)
[Infowarrior] - More on...The FBI Deputizes Business InfoSec News (Feb 09)
Spying in Norway reaches "all-time high" InfoSec News (Feb 09)
Linux Advisory Watch: February 8th, 2008 InfoSec News (Feb 09)
Govt urged to beef up computer security systems InfoSec News (Feb 09)
Official named to cybersecurity post while still under federal investigation InfoSec News (Feb 08)
Security Warning 2008: Top 11 Malware Threats To Watch Out For InfoSec News (Feb 07)
Clarity Sought on Electronics Searches InfoSec News (Feb 07)
Of cables and conspiracies InfoSec News (Feb 07)
Secunia Weekly Summary - Issue: 2008-6 InfoSec News (Feb 07)
Exclusive! The FBI Deputizes Business InfoSec News (Feb 07)
EVT '08 Call for Papers InfoSec News (Feb 07)
Critical bugs surge in reduced flaw haul InfoSec News (Feb 07)
Once more into the security breach InfoSec News (Feb 07)
NIST lists SCAP-validated tools InfoSec News (Feb 07)
Antivirus Inventor: Security Departments Are Wasting Their Time InfoSec News (Feb 07)
Re: Minimizing User Rights Can Increase Security InfoSec News (Feb 07)
Crime fears as cheap PCs head for Africa InfoSec News (Feb 07)
Cable damage hits 1.7m Internet users in UAE InfoSec News (Feb 07)
Hacking Tradition Under Fire? InfoSec News (Feb 06)
How TJX Avoided Wall Street's Wrath InfoSec News (Feb 06)
Spies' Battleground Turns Virtual InfoSec News (Feb 06)
Border security dominates DHS technology budget request InfoSec News (Feb 06)
Remote worker security still lax InfoSec News (Feb 06)
C-Level Executive Phishing Attacks On The Rise InfoSec News (Feb 06)
Minimizing User Rights Can Increase Security InfoSec News (Feb 06)
TCS makes Linux DISA compliant InfoSec News (Feb 06)
The State of Information Security 2008 InfoSec News (Feb 04)
Security List: Don't Talk About Holes, Or We'll Report You InfoSec News (Feb 04)
Computer Security Companies Agree To Testing Standards InfoSec News (Feb 04)
Big trouble with teen hackers InfoSec News (Feb 04)
How to Choose a Data Center InfoSec News (Feb 04)
FDCC compliance slowed by manual checks InfoSec News (Feb 04)
Al-Qaeda group's encryption software stronger, security firm confirms InfoSec News (Feb 04)
Research unmasks anonymity networks InfoSec News (Feb 04)
Analysis: Wireless phone headsets insecure InfoSec News (Feb 04)
Linux Advisory Watch: February 1st, 2008 InfoSec News (Feb 04)
Perspective: Security perimeter? What security perimeter? InfoSec News (Feb 04)
Cyberwar, Anyone? InfoSec News (Feb 04)
Secunia Weekly Summary - Issue: 2008-5 InfoSec News (Feb 04)
The risks of fraud go well beyond SocGen InfoSec News (Feb 04)