Researchers Make Wormy Twitter Attack
A cross-site scripting attack on Twitter could leave it vulnerable to a fast-spreading viral attack.
The CCTV Project Planner
CCTV implementations face a lack of product standardization, a confusing bidding process, and a limiting market structure. Here is expert guidance on critical considerations about bandwidth, frame rate, image quality and more.
NSA Director: We Don't Want to Run Cybersecurity
CSO Publisher Bob Bragdon moderates the IT Security Entrepreneur's Forum at Stanford University and blogs about the keynote speech from NSA Director and Lt. Gen. Keith Alexander.
Good FUD Vs. Bad: Is There Really A Difference?
A couple security bloggers suggest CSO Senior Editor Bill Brenner spreads FUD in a column that's supposed to be anti-FUD. Why he agrees -- to a point.
- Search On for Conficker's First Victim
- Hacking Tool Updated for Mac
- Bank Tosses Personal Data, Checks, Laptops
- Microsoft Releases IE8, Stresses Security
- The Security Certification Directory
- How to Write Apps Without Security Sinkholes
- 5 Things You Can't See on Your Network
- Scenes from SOURCE Boston
- Steps to Security's Economic Survival
- Bribery Case: Possible IT Nightmare in D.C.
- More Headlines
- Change Topic
Data Protection
- Search On for Conficker's First Victim
- Hacking Tool Updated for Mac
- Researchers Make Wormy Twitter Attack
- The CCTV Project Planner
- Browsers Hacked Before Phones at Security Show
- Microsoft Releases IE8, Stresses Security
- Good FUD Vs. Bad: Is There Really A Difference?
- Civil Liberties Groups Oppose Government Mobile-phone Tracking
- Criminals Sneak Card-sniffing Software on Diebold ATMs
- A Real Dumpster Dive: Bank Tosses Personal Data, Checks, Laptops
Security Virtual Conference
Presented by CIO, CSO, and Networkworld
Attend this free, 100% online event on March 24, 2009 from 9:30 am to 6:30 pm EST. Hear from experts on managing compliance mandates, insider threats, and much more.
How Cybercrime Has Changed
Trend Micro's Lab is analyzing 800 malware threats per hour! The bad guys are more sophisticated and have gone from nuisance crimes to attacks that make them rich. In this Webcast, hear about the latest cybercrime tactics and best practices to stay one step ahead.