Latest Articles

T[img_assist|nid=3395|title=|desc=|link=none|align=right|width=100|height=100]he Federal Trade Commission today finally voiced concern about the long-known problem of data leaking into criminal hands via LimeWire, BearShare, Kazaa and dozens of other  peer-to-peer (p2p)  file sharing networks. The FTC put nearly 100 companies and agencies on notice that their employees appear to be regularly leaking large amounts of sensitive customer and employee data on popular peer-to-peer, or P2P, file-sharing networks.  Read the full story [The Last Watchdog]

Read more...

[img_assist|nid=3380|title=|desc=|link=none|align=left|width=100|height=100]Researchers are preparing to release a free tool to stop
“drive-by” downloads: Internet attacks in which the mere act of
visiting a Web site results in the surreptitious installation of
malicious software. The new tool, called BLADE (Block All Drive-By
Download Exploits), stops downloads that are initiated without the
user’s consent. Read the full article. [Technology Review]

Read more...

Categories: Government

[img_assist|nid=3377|title=|desc=|link=none|align=right|width=100|height=100]Howard Schmidt has been involved in just about every aspect of the security industry during his career. After stints in the Air Force and at Microsoft, he served as a cybersecurity adviser to George W. Bush. Now, after heading back to the private sector for several years, he’s been appointed to serve as President Obama’s security adviser.

Read more...

[img_assist|nid=3370|title=|desc=|link=none|align=right|width=100|height=100]Mainstream attention to Operation Aurora and the Kneber (Zeus) botnet are welcome. It underscores how the Internet underground has advanced to the point where a plethora of
powerful hacking tools and services  is readily available to  novice
hackers and elite crime gangs alike –  with  prices  to fit every
budget. Read the full article. [The Last Watchdog]

Read more...