Wednesday, September 10, 2008

Survey Results from Blackhat

The Blackhat 2008 security conference was held recently in Las Vegas. Along with the RSA Security conference held in San Francisco at the beginning of each year, Blackhat is one... Read More

The Microsoft Dynamics GP is vulnerable to four heap and stack-based buffer overflows. A remote attacker could overflow the buffer and execute arbitrary code or gain control of the affected system by sending malicious queries to the Distributed Process Server or Distributed Process Manager. Read More

Back in April I wrote a blog post where I stated that in my opinion nothing in the world of digital data is unbreakable or impenetrable and that LifeLock, an... Read More

It is one thing when TJ Maxx or The Gap are careless with employee or customer data. Everyone entrusted with sensitive information such as addresses, birthdates, credit card information, bank... Read More

You have probably noticed that most retail establishments now have you swipe your own credit card. That is based, at least in part, on a goal to never have your... Read More

Google is jumping into the browser war. Chrome, the new web browser from Google, is set to take on Microsoft Internet Explorer, Mozilla Firefox and others. The current release is... Read More

Read More

There are a variety of threats attempting to compromise your computer and it takes a variety of tools to protect against them. Many vendors sell security suites, but many people... Read More

Read More

Do you have a MySpace or Facebook site? Do you access it from your computer at work? Social networking sites like these are one of the next challenges facing information... Read More

Jesper Johansson, co-author of Windows Vista Security: Securing Vista Against Malicious Attacks, recently wrote an article in The Register which dissects a new type of threat. Anyone with a blog... Read More

No comments: