Computer Malware and Preventive Recommendations: Botnets

/
Botnets are one of the fastest growing and the most dangerous threat on the Internet today. “Bot” stands for robot, which is a piece of software with some intelligence to perform a task and the “net” stands for network which is the collection of these individual bots under one controlling person called a bot herder.

Mac OS X: A Threat is growing…

/
Security researchers are discovering serious vulnerabilities in the Mac OS X system. Even though we have not seen specific malware to exploit these vulnerabilities, they do exist in the labs and technical papers as proof of concepts.

File Sharing Applications: Another way to be a victim of identity theft…

/
If you are using a peer-to-peer file-sharing program to download music and videos, you may be a prime candidate for Identity Theft. Applications such as Limewire, Edonkey and numerous others on the Internet may also allow individuals to download personal documents from your computer at will.

VMware’s 3rd Annual Federal Technical Conference in DC

/
VMware, Inc. makes virtualization software that runs on Microsoft…

IT Security Policy: The First Line of Defense

/
An IT security policy is a statement by management to how the organization will protect their resources from unauthorized access, alteration, or destruction. The IT security policy also provides a blueprint of management’s strategy as regards information security.

Adobe Zero-Day Attack on DC-Based Organizations

/
On June 4, 2010, Adobe announced a critical vulnerability with…

A Post without Image

/
Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris…