IT SECURITY

What you need to know about cloud computing

Decoding Cloud Computing

This month we focus on cloud computing and cloud analytics – a core functionality for every enterprise-wide solution. With SMAC (social, mobile, analytics, cloud) fast becoming a chosen technology for small to large enterprises, it has become necessary for pro

How Identity Theft Works ?

You work hard every day to make a living and support yourself and/or your family. If you’ve read the HowStuffWorks credit report and credit score articles, then you know how to keep your credit clean so you can enjoy the benefits of all of that hard work. What happens, thoug

How Not To Get Hacked

Protect Urself !

Follow These Simple Guidelines n u are done
*** Under the security option tab of Mozilla Firefox there is an option Show Passwords make sure its protected by the master password.

1. U may avoid using Internet Explorer(old versions) and make the switch to Opera, it’s more secure,

KEEP OUT THE BAD GUYS : ETHICAL HACKING

If you remember the Star Wars movies, there were two sides of the Force. The light side and the dark side. In the world of hacking, ethical hacking is considered the light side of hacking. Why?

Because ethical hackers use their skills and abilities for a constructive matter. Their intention is to offer adequate protection to their clients and assure them th

EU PRESIDENCY WEBSITE DEFACED (IT SECURITY)

Spanish Prime Minister’s picture changed with one of Mr. Bean

Unidentified hackers have defaced the website of the European Union Presidency assumed by Spain at the beginning of this month. The picture of Jose Luis Rodriguez Zapatero, Spain’s Prime Minister, was replaced with one depicting Mr. Bean, a world-renown

SEARCH ENGINES POISONING POSES THREATS TO SMALLER UNITS

After contaminating the search results on major search engines such as Google and Bing, search engine optimisation (SEO) poisoning is set to pose a threat to small and medium enterprises (SMEs).

SEO poisoning is a technique used by malware authors to mix rogue search results with legitimate ones. This attack, coupled with news ite

TODAY'S THREAT: COMPUTER NETWORK TERRORISM

“Carry out all my demands or the entire country’s electricity will be cut off.” Is this another line from a suspense film, or is it a palpable threat made possible with a computer keyboard? “Today, there is a growing trend amongst hackers around the world to threaten national infrastructures for ransom,” says Dr. Yaniv Levyatan, an expert in information war at the U

CHINA TRIED TO HACK INDIA'S COMPUTERS

LONDON: Chinese hackers have tried to penetrate computers in the offices of national security adviser MK Narayanan, a British paper on Monday quoted him as saying.

Narayanan said his office and other government departments were targeted on Dec 15, the same date that US defence, finance and technology companies, including Google, r

NEW COMPUTER VIRUS DISGUISED AS SOCIAL SECURITY ADMINISTRATION DOWNLOAD

A new spam campaign using false e-mails made to look like messages from the Social Security Administration is capable of stealing Social Security numbers and downloading malware onto victims’ home computers, says Gary Warner, director of computer forensics at the University of Alabama at Birmingham (UAB).

The campaign was discover

STUDENTS HACK INTO SCHOOL SYSTEM, CHANGE GRADES

GOLDEN – All is not golden at Colorado’s oldest school. Administrators are investigating reports that hackers got into Golden High School’s computer system and changed grades.

Students say it’s causing lots of confusion and frustration at the end of the first semester.