Twitter
LinkedIn
RSS

Posts Tagged ‘critical’


Yochai Benkler on the NSA

Excellent essay : We have learned that in pursuit of its bureaucratic mission to obtain signals intelligence in a pervasively networked world, the NSA has mounted a systematic campaign against the foundations of American power: constitutional checks and balances, technological leadership, and market entrepreneurship. The NSA scandal is no longer about privacy, or a particular violation of constitutional or legislative obligations. The American body politic is suffering a severe case of auto-immune disease: our defense system is attacking other critical systems of our body.

Read More...

Good Practices Guide on Non-Nuclear Critical Energy Infrastructure Protection (NNCEIP) from Terrorist Attacks

Good Practices Guide on Non-Nuclear Critical Energy Infrastructure Protection (NNCEIP) from Terrorist Attacks — 27 retweets 2 favorites

Read More...

TA13-169A: Oracle Releases Updates for Javadoc and Other Java SE Vulnerabilities

Original release date: June 18, 2013 | Last revised: June 19, 2013 Systems Affected Any system using Oracle Java including JDK and JRE 7 Update 21 and earlier JDK and JRE 6 Update 45 and earlier JDK and JRE 5.0 Update 45 and earlier JavaFX 2.2.21 and earlier Website owners that host Javadoc HTML API documentation Overview Oracle released the June 2013 Critical Patch Update for Oracle Java SE . This patch contains 40 new security fixes across Java SE products and a fix to the Javadoc Tool . API documentation in HTML format generated by the Javadoc tool that contains a right frame may be vulnerable to frame injection when hosted on a web server.

Read More...

Microsoft Security Bulletin Advance Notification for April 2013

“This is an advance notification of security bulletins that Microsoft is intending to release on April 9, 2013. This bulletin advance notification will be replaced with the April bulletin summary on April 9, 2013

Read More...

Special Webcast: 20 CSC Briefing – Live from Washington, DC

“Join the SANS Institute in this 20 Critical Security Controls Briefing. Being held live in Washington, DC hear Tony Sager and John Pescatore as they showcase key solution capabilities and customer success stories

Read More...

Zoosk asks users to reset passwords following mass leak

“Online dating service Zoosk is urging some of its users to change their passwords following the leaking of a list of some 29 million passwords that seemingly contains theirs. According to password expert Jeremi Gosney, who cracked over 90 percent of the leaked MD5 hashes (which were, unfortunately, not salted), nearly 3,000 contained the word “zoosk” in a variety of predictable combinations such as “logmein2zoosk” and “ilovezoosk”. The set also includes a number of passwords containing word combinations such as “lookingforlove” and “lookingforsex,” which definitely points to the fact that the password must belong to users of a one or more online dating services (not necessarily Zoosk)….”

Read More...

Trend Micro introduces new end user protection suite

“Trend Micro announced a new suite Trend Micro Enterprise Security and Data Protection – designed to help companies efficiently mitigate the risks of attacks and data breaches across the spectrum of end user platforms, from smartphones to tablets, laptops to removable drives. For all of consumerization's benefits and conveniences, companies are now wrestling with the challenges, costs, and risks of company-procured IT environments being supplemented by employee-owned technologies, creating new entry points for cyber-espionage and data loss….”

Read More...

Microsoft Security Bulletin Advance Notification for February 2013

“This is an advance notification of security bulletins that Microsoft is intending to release on February 12, 2013. This bulletin advance notification will be replaced with the February bulletin summary on February 7, 2013.

Read More...

Special Webcast: Continuous Monitoring using the Critical Controls

“The critical controls is a proven method for increasing security across an organization. Implementing the critical controls is an important step but what is also very important is to automate the auditing of the controls to allow for continuous monitoring across the organization. Attackers can move very quickly, compromise systems and go undetected for a long period of time….”

Read More...

65% of organizations experience three DDoS attacks a year

“Despite the increasing sophistication and severity of cyber attacks, a survey of more than 700 senior IT professionals reveals that organizations are surprisingly unarmed to deal with todays threat landscape, according to the Ponemon Institute and Radware. While 65 percent of organizations experienced an average of three DDoS attacks in the past 12 months, less than half reported being vigilant in monitoring for attacks much less putting into practice proactive and preventative measures to protect their organizations. The reality is that cyber threats are outpacing security professionals, leaving most organizations vulnerable and unprepared, said Avi Chesla, chief technology officer, Radware….”

Read More...