Are you a computer security professional?
You know you're a computer security professional when: • Although you have no ill intent, you spend no small amount of your downtime in airports thinking of ways to circumvent TSA security -- and...
View ArticleHacking Your Life (oh oh...)
A Virginia woman discovered that her married boyfriend had other girlfriends, and she decided to seek revenge online. According to federal prosecutors, she hired computer hackers to help. Elaine Cioni...
View ArticleXBox Project Natal at E3
Not really security relevant, but cool anyway... some more info on project Natal: http://news.cnet.com/8301-13772_3-20001174-52.html?part=rss&subj=news&tag=2547-1_3-0-20 What is project Natal?...
View ArticleAre you a computer security professional?
You know you're a computer security professional when: • Although you have no ill intent, you spend no small amount of your downtime in airports thinking of ways to circumvent TSA security -- and...
View ArticleHacking Your Life (oh oh...)
A Virginia woman discovered that her married boyfriend had other girlfriends, and she decided to seek revenge online. According to federal prosecutors, she hired computer hackers to help. Elaine Cioni...
View ArticleXBox Project Natal at E3
Not really security relevant, but cool anyway... some more info on project Natal: http://news.cnet.com/8301-13772_3-20001174-52.html?part=rss&subj=news&tag=2547-1_3-0-20 What is project Natal?...
View ArticleAnti-DoS Dynamic IP Restrictions for IIS 7.0 Hits Beta2
Microsoft has made available for download the second Beta development milestone of an anti-DoS extension for version 7.0 of Internet Information Services [IIS]. The Microsoft Dynamic IP Restrictions...
View ArticleMicrosoft Releases SDL Docs with Creative Commons License
[PCMag] In the last several years, for the most part, Microsoft “got” the importance of security and took it to heart. One of the main points they got was that it was in their interest for all the...
View ArticleMicrosoft releases Windows Phone 7 to manufacturers (RTM)
Security relevant? Not sure… Fun? Definitely! Can’t await mine… But to still give it a security touch, let’s put this under ‘Consumerization of IT’....
View ArticleMicrosoft Freshens Retro Code Lock-Down Tool
Microsoft has released a new version of a software tool that developers and administrators can use to harden older applications against common vulnerabilities. Short for Enhanced Mitigation Experience...
View ArticleA strong Password isn’t the strongest Security
Make your password strong, with a unique jumble of letters, numbers and punctuation marks. But memorize it — never write it down. And, oh yes, change it every few months… Yes, that’s it? Or not?...
View ArticleHold on to Your Keys!
There have been a few recent incidents of what we previously thought was extremely rare — malware authors using code signing certificates that were issued to companies with good reputations. The...
View ArticleStep by step instructions on how to build a UAG SP1 DirectAccess lab with NAP
Good article and step by step instruction on simplifying DA/NAP deployments with UAG:http://www.windowsecurity.com/articles/Integrated-NAP-Functionality-UAG-2010-Service-Pack1-DirectAccess.html – Urs
View ArticleGermany provides a secure way to deal with spam
“In theory, stopping spam is easy: just make it uneconomic to send millions of messages by charging for each one sent, or make senders authenticate their identity to stop address spoofing and simplify...
View ArticleWindows 7 almost five times more secure than XP
CNET: Windows 7 almost five times more secure than XPThose are the findings of Microsoft’s latest Security Intelligence Report, which detailed in depth the state of software vulnerabilities, exploits,...
View Article
More Pages to Explore .....