|
|
|
Author: Donald Carroll
Company: Security University
Region: Reston, VA 20190
Website: www.securityuniversity.net
Memorable Quote 1: World Class How To Article Base
Memorable Quote 2: Security University - Computer Security Training, Ethical Hacking, & Security Certification Exams
Author Comment / Biography: C I S S P, free practice tests, Q/ISP, CEH, CEH version7, CEH7, hacking, Computer security training, DoD 8570, Cyber Security, Intense School, CCCure, Infosec Institute, CISA, CISM, DoD training, IAT I, QISP, CND, Qualified Information Security Professional, Qualified Assurance Professional, QSA, certification exam, Qualified Security Analyst Pen Tester, QPTL, Qualified Penetration Tester License, QEH, Qualified Ethical Hacker Defender,QEP, Edge Protector, QFE, Forensic Expert, ECSA, CHFI, QWAD, tactical security skills, CND, Hacker, CNSS, Trojans, ISC2, CISSP, CWNA, CWSP, CISSP Prep Review Class, SSCP, ITIL, CCNA, Security+, Network+, QSSE, Reverse Engineering, FISMA, NIST SP 800-53 Compliance.
|
Articles by Donald Carroll |
31. New Oracle ERP Vulnerabilities Unmasked
March 06, 2012
Design flaws could allow attackers to access, alter, or take over ERP systems -- but will enterprises do anything about the vulnerabilities?
By Kelly Jackson Higgins Dark Reading Researchers today issued security advisories for eight vulnerabilities, some of them critical, in a popular Ora...
|
|
|
32. New Verizon Breach Data Shows Outside Threat Dominated 2011
March 06, 2012
Preview of Verizon Business' data breach cases shows malware and hacking the top breach methods.
By Kelly Jackson Higgins Dark Reading
RSA CONFERENCE 2012 -- San Francisco, Calif. -- More than 85 percent of the data breach incident response cases investigated by Verizon Business las...
|
|
|
33. New Spam Targeting Facebook Users Is Invisible to Most Virus Scans, Says Expert
March 04, 2012
ScienceDaily (Mar. 22, 2010) — Cyber-criminals are using fake e-mails to target Facebook users and deliver computer viruses that were being detected only by one-third of the 42 most common anti-virus products as of 12 noon March 18, says a leading cyber-crime researcher at the University of Alabama ...
|
|
|
34. Hacker penetrates T-Mobile systems
March 04, 2012
A sophisticated computer hacker had access to servers at wireless giant T-Mobile for at least a year, which he used to monitor U.S. Secret Service e-mail, obtain customers' passwords and Social Security numbers, and download candid photos taken by Sidekick users, including Hollywood celebrities, Sec...
|
|
|
35. The riskiest cities for cyber crime: Where does yours rank?
March 02, 2012
By Kevin McCaney Feb 17, 2012
Washington, D.C., has climbed to the top of the list of cities with the highest risk of cybercrime, according to a new report by Symantec’s Norton Internet Security and Sperling’s BestPlaces.
Seattle, San Francisco, Atlanta and Boston round out ...
|
|
|
36. The University of North Carolina at Charlotte is the latest victim of data breach
March 01, 2012
We have been covering news reports about data breaches across organizations and healthcare centers. Schools and Universities are also targets of data thefts. This story comes from Charlotte, North Carolina. The UNC’s sever has been hacked and students are being informed about the data theft. ...
|
|
|
37. Scared of Anonymous? NSA chief says you should be
March 01, 2012
Anonymous has so far plied its trade in "hactivist" exploits. But according to the director of the National Security Agency, it might soon turn its focus to U.S. infrastructure.
According to the Wall Street Journal, citing sources, Gen. Keith Alexander has said in private meetings at the Whi...
|
|
|
38. Making Windows Secure From The Ground Up
February 29, 2012
Microsoft's Steve Lipner, who was a major proponent of the need for a secure development methodology, talks about the successes of Microsoft's push -- and the costs.
By Robert Lemos, Contributing Writer
When Microsoft announced the Trustworthy Computing Initiative more than a decad...
|
|
|
39. More Than Half Of Cyberattacks Come From Asia
February 29, 2012
DDoS attacks worldwide on the rise, report finds.
By Kelly Jackson Higgins Dark Reading Asia is a hot spot for distributed denial-of-service (DDoS) and other types of online attacks, and, not surprisingly, DDoS attacks have spiked during the past few months.
It has been a busy year...
|
|
|
40. StopTheHacker Launches
February 28, 2012
New Web security-as-a-service firm comes out of stealth mode with new funding and new services.
By Kelly Jackson Higgins Dark Reading A Web security-as-a service (SaaS) company officially launched today, announcing an initial round of $1.1 million in funding from a venture capital firm and...
|
|
|
|
|
|
>
|