Twitter Mouse-Over Flaw Send Users to Dangerous Links

/
Earlier in the day a security flaw turned Twitter's Website into a chaotic and potentially unsafe place, filled with annoying pop-up windows that activated just by rolling the mouse over another user's tweets.

FCC to make ruling on “White Space” usage.

/
On September 23rd the FCC will vote on a new set of rules that will finally allow their planned “super WiFi” to become reality. In 2009 the FCC voted to open up the vast amounts of “white space” frequencies that lie between television broadcast channels.

The EnCase Evidence File Format

/
The EnCase evidence file can also be referred to as a forensic…

Creating a Comprehensive Vulnerability Assessment Program for a Large Company Using QualysGuard

/
ulnerability Assessment, according to wikipedia.org, is the process of identifying and quantifying vulnerabilities in a system. Vulnerability assessment can be used against many different types of systems such as a home security alarm, the protection of a nuclear power plant or a military outpost. Note that vulnerability assessment is different from risk assessments even though they share some of the same commonalities. Vulnerability Assessment concerns itself with the identification of vulnerabilities, the possibilities of reducing those vulnerabilities and improving the capacity to manage future incidents. This paper will focus primarily on vulnerability assessment as it pertains to information technology infrastructure and how utilizing QualysGuard can ease the burden on your technology staff.

‘Here You Have’ Worm Runs Wild Hitting U.S. Organizations Hard

/
Last week a hacker named, "Iraq resistance" who has been trying to unite other like-minded hackers in a cyber jihad effort towards US initiated a malicious computer worm know as the "Here you have" worm. A computer worm is a self-replicating malware computer program that uses computer networks to send copies of itself to other computers on a network without any user intervention.

Microsoft Security Bulletin Summary for September 2010 – Issued: September 14, 2010

/
With the release of the bulletins for September 2010, this bulletin summary replaces the bulletin advance notification originally issued on September 9, 2010. For more information about the bulletin advance notification service, see http://www.microsoft.com/technet/security/Bulletin/advance.mspx.

Adobe Zero-Day Strikes Again

/
For the second time in nearly a week, Adobe Systems is warning users about a zero-day vulnerability under attack.

Spammers Stay Busy Despite Pushdo Botnet Hit

/
From the shutdown of McColo to last week's disruption of the Pushdo botnet, spammers have continually found ways to stay in business. Nearly 20 of the 30 command and control (CnC)servers associated with Pushdo were taken offline last week due to efforts by security vendor LastLine. The servers were supported by eight hosting providers, some of which did not respond to the vendor's requests for action.

New Fake TweetDeck Update – Beware of Spreading Malware

/
Many TweetDeck users have awaken to an unfortunate surprise this morning when trying to launch the application. What is the unfortunate surprise you ask? “It did not work!” Twitter has recently implemented major changes to how other applications access your Twitter account and hackers have taken the opportunity by implementing a malware since they know millions of Twitter users will be looking for the new updates. The fake Tweetdeck update that is actually a Trojan virus. A Trojan virus is malware that appears to perform a desirable function for the user but instead facilitates unauthorized access of the user's computer system.

Security Job Posting – Urgent Position -90k Network Security Specialist position in Alexandria VA

/
Our Client has an immediate need for a Network Security Specialist to support a true (24x7x365) NOC in Alexandria,VA for the USPTO (US Patent Trade Office) on the EUS contract. This is a perm requirement.