Searching for security

  • ESET NOD32 antivirus 4 Review. Published October 28th, 2011 by admin. In jargon Created by Capabilities Combined with security, What ESET NOD32 ...
  • Overview of NOD32 Antivirus Software which offers a smattering of antivirus programs such as NOD32 Antivirus 4, not to mention a host of security features.
  • Homeland Security selects Online Trust Alliance for cyber training to increase awareness and to stem the flood of spear phishing attacks on government agencies meant to steal secrets or wreak havoc on critical U.S. infrastructure. Cyber mayhem strikes as hackers launch digital attack that destroyed a water pump in real time and the physical world of Springfield, Illinois. Unhappy with Homeland Security's response, a hacker took aim at the SCADA system behind Houston's water supply network and posted 'prrof of concept hack.
  • The U.S. government needs to be certain that our response to the genuine and massive threat of cyber attacks is not as bureaucratic and fractious as everything else that goes on in Washington these days.
  • While Android is hugely popular, it's also the most highly targeted OS for mobile malware. In fact, numerous security firms predict doom and gloom for Droid security in the 2012 mobile device ecosystem; cybercriminals may view Android as the new low-hanging fruit. Android mobile malware has 'exploded' and was dubbed one of the biggest cyber menaces for government.
  • Android security researcher Trevor Eckhart has recently found himself in some hot water after performing a deep dive into mobile tracking software from a company called Carrier IQ. He managed to figure out how Carrier IQ's software worked and what it could monitor, but in doing so he has earned the company's ire. Carrier IQ has filed a cease-and-desist letter [PDF] against Eckhart claiming that he committed copyright infringement by reproducing some of the company's training materials in his post and that he made "false allegations" about the nature of their software.
  • A loophole in the software of some printers could leave them open to some very strange security hacks.
  • Three hackers say they have exploited a vulnerability in Research In Motion's PlayBook tablet to gain root access to the device, a claim that could damage the BlackBerry maker's hard-won reputation for security. Root access means a user has permission to alter any file or program on a device and can control hardware functions. In a response to queries, RIM said it is investigating the claim, and if a "jailbreak" is confirmed will release a patch to plug the hole. ...
  • Sen. Al Franken (D-Minn.) is calling on a developer to provide details of hidden software installed on smartphones that logs numerous details about users' activities. In a letter sent Thursday to Carrier IQ president Larry Lenhart, Franken asked for an explanation of what the company's software records, whether it transmits data to a third party and whether the data presents any security or privacy risks.
  • FCC chairman says agency will review whether new rules adhere to Communications Act, First Amendment and other laws and policies. Read this blog post by Elinor Mills on InSecurity Complex.