Recent Articles
-
Transcend Releases Copy Protection SD, microSD Memory Cards
Transcend Information, a provider of storage and multimedia products, announced the launch of its Copy Protection SD/microSD memory cards. By recording data in a CD-ROM style partition, Copy Protection SD/microSD cards are designed to ensure the safety of valuable intellectual property against unauthorized copy, modification and deletion. The company said preloading memory cards at the…
-
Top Security Breaches Caused by Technology Partners
Top Security Breaches Caused by Technology Partners Breached Organization: Lawrence Memorial HospitalThird-Party Involved: Blue Sky Credit, BrickWire LLCData Lost: Names, personal information, health care provider information, credit card numbers and checking account information for 10,000 patientsThe Situation: A third-party burn of two degrees, Lawrence Memorial Hospital was left responsible for a breach of patient financial…
-
Microsoft Releases Workarounds for DoS Zero-Day Bug in ASP.NET
Microsoft has released a workaround for an ASP.NET vulnerability to help protect Websites against potential denial-of-service (DoS) attacks, according to a security advisory. The publicly disclosed vulnerability affects all supported versions of the .NET framework, but Microsoft is "not aware" of any attacks in the wild currently exploiting the flaw, Dave Forstrom, director of Microsoft…
-
Corporate Espionage Meets Hacker Tradecraft
Corporate Espionage Meets Hacker Tradecraft "We expect to see that the specific Hacker Tradecraft (malware, tools, tactics) , which is developed with government support and for government use, will begin to be shared with non-government/private organizations so that they can target their competitors in the private sector in search of Intellectual Property which is valuable…
-
Enterprises Need Proper Computer Disposal Policies to Protect Sensitive Data
A new computer, mobile device or other IT equipment generally requires some effort setting up and migrating data. Enterprises also need to spend the time making sure the data is completely removed from the equipment as it is replaced. Organizations do not always stop to consider the security implications of leaving data on obsolete equipment…