More Information Technology & Security Topics
Date: Saturday, February 06 @ 13:26:20 PST
Topic:








Social Media Use Tied to Increase in Malware Infections
    playgrounds for attackers, spammers and others.- threatpost.com

Hosting provider InMotion hacked
    Thousands of sites affected.- threatpost.com

Security Expert: U.S. 'Leading Force' Behind Stuxnet
    cyber-superweapon might harm those who created it.- npr.org

Troubling Cracks Showing in Internet's Security Foundation
    inherent problems of the protocol - threatpost.com

Japan's defense industry hit by its first cyber attack
    some information could have been stolen - news.yahoo.com

Computer-based attacks emerge as threat of future
    more attacks that destroy entire systems - washingtontimes.com

Report warns U.S. unprepared for cyber attacks
    The businesses community has failed to understand that - hsnw.com

How Online Privacy Has Become an Oxymoron
    Americans have surrendered their privacy - threatpost.com

Microsoft online services hit by major failure
    Hotmail, Office 365, & Skydrive affected - bbc.co.uk

Wireless Phone Networks Stood Up Well to Hurricane
    despite widespread losses of power. - nytimes.com

Hackers Hijack Websites In Online Pharmacy Scam
    redirected to illicit online drug sellers - npr.org

Securing Mobile Devices?
    May Be an Impossible Task - threatpost.com

Revealed: Operation Shady Rat
    Taken aback by the audacity of the perpetrators - Mcafee.com

Don't Say I Never Told You
    Congress Warned Of Stuxnet Variants - threatpost.com

The Next Security Scandal
    An Attack on High Frequency Trading Systems - threatpost.com

Anatomy of an Inventive DR Plan
    The A Team - blog.fibertown.com

Who Else Wants to Understand?
    The 3 Types of Cloud Computing - blog.fibertown.com

DHS warns utilities at risk from insider threats
    terrorists could be targeting major facilities - hsnw.com

Pentagon Strategy Prepares For War In Cyberspace
    A cyberattack on the U.S. could prompt a military response - npr.org

U.S. House Committee
    Questions Ability to Secure Wall Street Data - threatpost.com

Pentagon Discloses Massive Data Theft
    Lays Out New Security Strategy - threatpost.com

Report, US Hosting Providers
    Infested with Malware, Botnets - threatpost.com

Washington Post Hacked
    1.27M IDs and E-mail Addresses Stolen - threatpost.com

Morgan Stanley Smith Barney Breach
     Loses Information of 34,000 - threatpost.com

Citigroup Computer Breach
    Hackers access Customer Data, Company Confirms - AOLNews.com

Amazon’s Trouble Raises Cloud Computing Doubts
     a wake-up call for cloud computing - NYTimes.com

I've Been Hacked! Now What?
    How to Turn Your Zombie PC Back to Normal - About.com
Epsilon Data Breach Expands
    Capital One, Disney and others hit - threatpost.com
Sites hit in massive web attack
    Hundreds of thousands of websites compromised - BBCNews.com
HIPAA Bares its Teeth
    $4.3m Fine for Privacy Violation - threatpost.com
Cyberweapon could cause Internet doomsday
    What will it take? - hsn.com
Anonymous Hackers Release Stuxnet Worm Online
    it could lead to something bad, soon - foxnews.com
New Hacking Tools Pose bigger Threats to WI-FI Users
    Web site Administrators scrmblimg - NYTimes.com.com
Malicious Spam Jumps to 3 Billion Messages Per Day
    upwards of 90 % of all email messages- threatpost.com
McAfee: China leads world in hacked computers
    US the most vulnerable to cyberattack- hsnw.com
Critical Infrastructure Twice as Likely
    to be targeted by Cybercriminals- ScanSafe.com

Cyber attacks against Australia 'will continue'
    Australian government websites blocked- BBC.News

U.S. at Risk of Crippling Cyber Attack
    The Changing Threat - ODNI Assessment

Google Attack Was Tip of the Iceberg
    networks had been thoroughly compromised - threatpost.com.com

One in Every 150 Legitimate Sites Infected by Malware
    reached unprecedented levels in 2009 - threatpost.com.com

If Your Password is 123456, Just Make it HackMe
    like leaving a key under the doormat - NYTimes.com

5 easy ways to speed up your computer
    boost your desktop or notebook PC's speed and performance - HP

Taking Data Protection to the Edge - Iron Mountain
    Protection Must Cover Today's Mobile, Extended Enterprises

20 Questions to Ask Your Supplier About Voice Over IP
    Before You Buy








This article comes from Survival Insights
http://www.survivalInsights.com/

The URL for this story is:
http://www.survivalInsights.com//modules.php?name=News&file=article&sid=156