Pages

Wednesday, June 22, 2005

Mobile Pipeline | Ten Top Tips For Mobile Security

Network security: a devilish mess

 In the aftermath of the Sept. 11 terrorist attacks, the Defense Department called on IT experts to help assess the security of public networks in the event of a cyberattack on the United States.

7 security mistakes companies make

 Opinion: Despite highly publicized data security breaches, many organizations continue to make serious mistakes that introduce or retain unnecessary risk. Careful introspection is needed: Don't be afraid to look in the mirror, says columnist Peter H. Gregory.

10 essentials of MSP log management

 Jian Zhen outlines 10 must-haves for building a successful log management infrastructure.

CNN.com - Wireless�Web puts personal data at risk - Jun 21, 2005

Technology News: Security: Companies Not Keeping Up with Network Security Needs

Kaiser Permanente division fined $200k for patient data breach

 The California Department of Managed Health Care has fined Kaiser Foundation Health Plan, a division of Kaiser Permanente, $200,000 for exposing the confidential health information of about 150 people.

Identity Theft: An Inside Job

 To deter identity theft, companies need more than IT security.

Secure Your Shredding

 With enough time and resources, nearly any paper document can be reconstructed if it is not shredded properly.

Calif. Lawmakers Back Tougher Identity Theft Law

 Concerned with the growth of identity theft, California lawmakers have given initial approval to a bill that, with other state safeguards, would require companies to notify consumers of all security breaches involving their personal information.

Security flaw derails an online CVS service

 Boston Globe Jun 22 2005 10:07AM GMT

Cryptography and .NET Framework - Part 1

 WWW Coder Jun 22 2005 5:05AM GMT

Credit-card hacker hits 13,000 in NZ

  The New Zealand Herald Jun 22 2005 3:26AM GMT

Phishers Jump On MasterCard Breach

 Techzonez Jun 22 2005 11:11AM GMT

Cisco under fire for VPN vulnerability

 Personal Computer World Jun 22 2005 2:37PM GMT

Stolen records in latest breach were improperly kept

 A third-party processing company should not have been keeping records stolen weeks ago by online thieves in a security breach that could have exposed 40 million credit-card numbers to fraud, the company's CEO told The New York Times over the weekend after the breach was revealed last Friday.

Survey: 50% of US firms dealt with computer porn


Pop-up vulnerability found in major browsers

 Flaw could trick Web surfers into giving away personal information by popping up a malicious dialog box in front of a trusted Web site.

New ISO 17799 Security Standard Published

 The official revision of the ISO 17799 security standard is now available. This has been under development for several years, and introduces a number ...

Tuesday, June 21, 2005

Kaiser fined over confidential patient info

 Kaiser Foundation Health Plan has been fined $200,000 by a state agency for unauthorized online disclosure of patient health information.

How Safe Are the New Contactless Payment Systems?

Are Biometrics the Answer to the Password Problem?

Are Biometrics the Answer to the Password Problem?

Businesses beware: White collar crime, Internet fraud up

 From securities and financial fraud to intellectual property and computer data theft, a bevy of opportunities exist for white collar criminals to fine tune their trade.

Black Market in Stolen Credit Card Data Thrives on Internet - New York Times

It is the employer not the employee who is the weakest link in a company's IT security

Security Park Jun 21 2005 12:36PM GMT

Kaiser fined for patient data breach

Cisco targets Net phone software flaw

Monday, June 20, 2005

Encryption is the missing defence tool in many companies' security policy

 Security Park Jun 20 2005 5:12PM GMT

MasterCard Says Only 68,000 at Higher Level of Risk in Breach

Only a small fraction of the 13.9 million credit cards accounts at MasterCard exposed to possible fraud were considered at high risk, the company said.

Learning From IT Data Debacles

Disk Crypto Redux - Computerworld

FDIC Reports Security Breach

 Add a U.S. federal government agency to the list of organizations faced with disclosing that personal data has been stolen.

Hacker accesses files at Equifax | CBC

Financial Firms Fight Back Against Phishing

 eWeek Jun 20 2005 4:11PM GMT

The desktop is the best place to stop spyware

Clamp down on security leaks

Your organization's Sarbanes-Oxley audit is scheduled for this summer. Will you be able to show who has access to financial records and what they're doing with that data? Just as important, can you prove you're equipped to take immediate action when policy violations occur?

Securing data at the point of use

Inspecting content on the wire, the approach taken by the products in this roundup, is nothing new. In fairness to these vendors, they've put a lot of hard work into optimizing their solutions to hand

Take a holistic approach to data security

 Technology that safeguards private data and intellectual property is clearly an essential part of a total security strategy. Experts say at least one of the technologies covered in this roundup should be installed to protect content, whether that technology uses agents to enforce rights management or heuristics to sense or block sensitive data from leaving the network.

Bugtraq: Cisco VPN Concentrator Groupname Enumeration Vulnerability