Mac OS X: A Threat is growing…

/
Security researchers are discovering serious vulnerabilities in the Mac OS X system. Even though we have not seen specific malware to exploit these vulnerabilities, they do exist in the labs and technical papers as proof of concepts.

File Sharing Applications: Another way to be a victim of identity theft…

/
If you are using a peer-to-peer file-sharing program to download music and videos, you may be a prime candidate for Identity Theft. Applications such as Limewire, Edonkey and numerous others on the Internet may also allow individuals to download personal documents from your computer at will.

VMware’s 3rd Annual Federal Technical Conference in DC

/
VMware, Inc. makes virtualization software that runs on Microsoft…

IT Security Policy: The First Line of Defense

/
An IT security policy is a statement by management to how the organization will protect their resources from unauthorized access, alteration, or destruction. The IT security policy also provides a blueprint of management’s strategy as regards information security.

Adobe Zero-Day Attack on DC-Based Organizations

/
On June 4, 2010, Adobe announced a critical vulnerability with…

A Post without Image

/
Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris…