An amazingly simple and effective product to protect data files in your laptop, PC, flashdisk, or memory card. The Philippines' first computer data security USB key. For details call (632)813.41.62/63
3/31/11
3/30/11
wallyibong: Jackie Chan is dead - RIP Jackie Chan Rumors True ...
wallyibong: Jackie Chan is dead - RIP Jackie Chan Rumors True ...: "The death of Jackie Chan is currently trending now on Twitter. Though it's not yet April, some of the Twitter fan has been fooled by this ru..."
Quakebook Blog: Welcome to 2:46 QuakeBook
Quakebook Blog: Welcome to 2:46 QuakeBook: "The 2:46 Quakebook project started with a tweet and is on the verge of something great, a way that we can help all those hit by the the Mar..."
Scam Sniper: A Sightseeing firms breach, net's cyber criminals ...
Scam Sniper: A Sightseeing firms breach, net's cyber criminals ...: "A sightseeing company by the name of CitySites owner of Twin America, reported that the credit card details of 110,000 customers has been s..."
The BULLDOG Estate: FarmVille Scam: Beware of the “White Kitty” Notice...
The BULLDOG Estate: FarmVille Scam: Beware of the “White Kitty” Notice...: "Tweet Source: farmvillefreak FarmVille White Kitten We’re here again to alert you to another scam. Like they say, “if it’s too good to..."
Scam Sniper: Phishing campaign targets First Data merchant acco...
Scam Sniper: Phishing campaign targets First Data merchant acco...: "Share App River, an e-mail security vendor, is warning of a phishing attack which targets First Data merchant accounts. Intended victims ..."
Data Theft is Alive and Well in Secure Networks.
Data theft is alive and well in secure networks
http://blog.imperva.com/2010/12/data-theft-is-alive-and-well-in-secure-networks.html
http://blog.imperva.com/2010/12/data-theft-is-alive-and-well-in-secure-networks.html
3/29/11
3/28/11
AlBlue’s Blog: [Mac] Data loss on Leopard USB drives
AlBlue’s Blog: [Mac] Data loss on Leopard USB drives: "One of the cardinal rules in upgrading operating systems is always wait for at least the .2 release before using it for production use. Leop..."
3/27/11
3/25/11
3/23/11
3/22/11
Wyld About Technology: RSA SecurID Data Breach Shows the Need for Vigilan...
Wyld About Technology: RSA SecurID Data Breach Shows the Need for Vigilan...: "Don't miss a single issue of eWEEK.com Securing the Enterprise. Add newsletters@response.eweek.com to your address book. Vie..."
HolisticInfoSec.org: Verizon Data Breach Report & OWASP Top 10's #6
HolisticInfoSec.org: Verizon Data Breach Report & OWASP Top 10's #6: "The fact that Computerworld's Jeremy Kirk just reported that data breaches are often caused by configuration errors (as noted in Verizon's l..."
3/21/11
Health Care Renewal: Medical Data Breach of the Month Department: Healt...
Health Care Renewal: Medical Data Breach of the Month Department: Healt...: "I have written frequently about the breaches of electronic information security, such as at my posts: 'Networked EMR's and Healthcare Infor..."
Health Care Renewal: Medical Data Breach of the Month Department: Healt...
Health Care Renewal: Medical Data Breach of the Month Department: Healt...: "I have written frequently about the breaches of electronic information security, such as at my posts: 'Networked EMR's and Healthcare Infor..."
SCADAhacker: McAfee: Data-theft attack hits oil industry
SCADAhacker: McAfee: Data-theft attack hits oil industry: "McAfee: data-theft attack hits oil industry by Stephen Shankland (CNET News) For years, companies in the oil and energy industry have be..."
New Millennium Computers' Technology Blog: Data theft: How to protect your company's valuable...
New Millennium Computers' Technology Blog: Data theft: How to protect your company's valuable...: "Occasionally, a company may find that one or more of it's employees have stolen valuable data of some kind. Internal security th..."
Fey Insurance Blog: Data Loss
Fey Insurance Blog: Data Loss: "If a fire where to occur at your business it is relatively easy to replace desks, chairs, decorations and even computers and network systems..."
3/20/11
3/17/11
Browser wars heat up: IE9 versus Firefox 4 - Technology - GMA News Online - Latest Philippine News
IE9 takes minimalist, 'color-coded' approach, Firefox touts sync feature, Chrome: cloud print
3/16/11
3/15/11
3/14/11
3/7/11
WordPress Attacked
WordPress.com, a blog publishing platform, was recently a target of a distributed denial of service attack (DDoS). Founder Matt Mullenweg disclosed to TechCrunch that the attacks started Thursday, and lasted until Friday. Normal operations in WordPress came back just this Sunday.
Basically, a DDoS attack is an attempt to disable a computer resource from functioning for its intended users. It is usually done by overwhelming a website with so much data, which results to slowing the website, or making it totally unavailable. These attacks were deemed by WordPress as the largest in its six years of existence.
Furthermore, WordPress identified that 98% of the attacks from Thursday to Friday originated from China, and that it was politically motivated. The Chinese responded that “The allegation that China supports hacking is groundless.”
3/3/11
Morgan Stanley, Victim of “Operation Aurora”
Recent developments revealed that Morgan Stanley, a global financial services firm, was hit by the infamous “Aurora” hackers of 2009. The details of said hack were disclosed through leaked HBGary emails.
Operation Aurora gained notoriety when Google publicly announced last January 2010 that it had been a victim of cyber attack, and disclosed that the attacks originated in China. Other researchers inferred from the sophistication of the attack that the Chinese government may have sanctioned, or even masterminded the operation.
Morgan Stanley and Google are not the only ones breached by these hackers. At least 20 more companies have been identified as targets of Operation Aurora. In regards to these findings, the US government is requesting China for a formal explanation.
Subscribe to:
Posts (Atom)