So Much Data, So Little Encryption

If you go solely by top-level stats on encryption use, you’ll come away feeling pretty secure — 86 percent of the 499 business technology professionals responding to our InformationWeek Analytics State of Encryption Survey employ encryption of some type. But that finding doesn’t begin to tell the real story. Only 14 percent of respondents say…

0

9 Ways to Increase the Security of Your Laptop While on the Road

Using your laptop to get work done away from your office or on the road is becoming widely accepted. But this rapid growth in laptop computing has made portable systems the target for theft around the world. If your laptop computer is stolen, company information can be exposed, as well as your personal and financial…

0

The Microsoft Security Update Guide

This guide was designed to help IT professionals better understand and use Microsoft security release information, processes, communications, and tools. Our goal is to help IT professionals manage organizational risk and develop a repeatable, effective deployment mechanism for security updates. http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=c3d986d0-ecc3-4ce0-9c25-048ec5b52a4f -Urs  

0

Conficker’s First Birthday Looms – Seven Million IPs Still Infected

As Conficker approaches the first anniversary of its appearance in the wild, the Shadowserver Foundation says that at least seven million IP addresses — each representing one or more computers — are now infected by the worm.http://www.infosecurity-magazine.com/view/4941/confickers-first-birthday-looms-seven-million-ips-still-infected/ Perhaps a very good idea for the seven millions to look at the free:Microsoft Security Essentials (MSE) Antimalware…

0

Microsoft Security Intelligence Report volume 7 (January – June 2009) released

The Microsoft Security Intelligence Report (SIR) provides an in-depth perspective on the changing threat landscape including software vulnerability disclosures and exploits, malicious software (malware), and potentially unwanted software. Using data derived from hundreds of millions of Windows computers, and some of the busiest online services on the Internet, this report also provides a detailed analysis…

0

Phishing, Worms Spike This Year, Say Microsoft and McAfee

Scammers are targeting social networks with phishing scams and relying more heavily on worms and Trojans to attack computers, according to security trend reports to be released Monday by Microsoft and McAfee. http://news.cnet.com/8301-27080_3-10387768-245.html The Microsoft Security Intelligence Report (v7) was released today and can be found here:http://www.microsoft.com/security/portal/Threat/SIR.aspx The McAfee press release along with report (PDF)…

0

Windows 7 Security Story May Appeal to Enterprises

The Windows 7 security story has three main chapters that have received a fair amount of attention: DirectAccess, BitLocker To Go, and AppLocker. With these, as well as features such as BranchCache and enhancements to UAC (user account control), officials at Microsoft have said they feel they are pushing out their most secure operating system…

0

Free Microsoft Security Tool Locks Down Buggy Apps (EMET)

EMET, short for Enhanced Mitigation Evaluation Toolkit, allows developers and administrators to add specific security protections to applications. Unlike mitigations released in the past, EMET doesn’t require programs to be recompiled, so it can be used to fortify applications even when the source code isn’t available. http://blogs.technet.com/srd/archive/2009/10/27/announcing-the-release-of-the-enhanced-mitigation-evaluation-toolkit.aspx -Urs  

0

Internet Phone Systems Become the Fraudster’s Tool

Cyber criminals have found a new launching pad for their scams: the phone systems of small- and medium-sized businesses across the U.S. In recent weeks, they have hacked into dozens of telephone systems across the country, using them as a way to contact unsuspecting bank customers and trick them into divulging their bank account numbers…

0