Department of Homeland Security Plans to Hire 1,000 Cyber-Security Experts to Protect U.S. Computer Networks

/
In October of 2009, Department of Homeland Security Secretary Janet Napolitano stated, "Cyber-security is one of our most urgent priorities" when she announced that The Department of Homeland Security plans hire up to 1,000 cyber-security experts in the next three years to help protect U.S. computer networks.

Black Hat Uplink USA 2010

/
This year thousands of security professionals from around the world are making plans to be a part of Black Hat USA 2010. But not all of those people will actually be in Las Vegas. With Black Hat Uplink, you can experience essential content that shapes the security industry for the coming year. Register now for Black Hat Uplink with Promo Code BHUL443 to activate your discount (limited number of seats available).

Dell PowerEdge Motherboard Firmware Contains Malware

/
SecurityOrb.com has learned Dell has officially confirmed that some of its PowerEdge R410 rack server motherboards were shipped to customers with malware embedded on the server management firmware. Many customers became frustrated due to the company’s slow response to provide details on the matter.

Apple iPhone 4 Signal Issues

/
The reports were about the iPhone 4 suffering from a severe drop in signal reception. Even Consumer Report, which publishes reviews and comparisons of consumer products and services based on reporting and results from its in-house testing laboratory with approximately 7.3 million subscribers stated, “we can not recommend the iPhone 4 due to the antenna/signal issues that are obviously and apparent.”

Microsoft Security Advisory (2286198): Vulnerability in Windows Shell Could Allow Remote Code Execution

/
Microsoft Security Advisory (2286198): Vulnerability in Windows Shell Could Allow Remote Code Execution: Microsoft is investigating reports of limited, targeted attacks exploiting a vulnerability in Windows Shell, a component of Microsoft Windows. This advisory contains information about which versions of Windows are vulnerable as well as workarounds and mitigations for this issue.

Spyware: The New Annoying Threat

/
So what is this spyware? Spyware is software that collects personal information from your computer without your knowledge of the occurring event. Information gathered from spyware ranges from the collection of all web-browsing activities to collecting sensitive information like usernames, passwords, address and even your social security number. Spyware has the ability, when installed, to modify system settings, which perform undesirable tasks on your computer system. Furthermore, spyware has been known to redirect user’s web browsers, cause computers to dial services for which they are billed and install DLLs and other executables files to send your personal data to another computer. This is done by using the computer's memory resources and also by utilizing bandwidth, as it sends information back to the spyware's home server via the user's Internet connection. Because the spyware program is using memory and system resources, the applications running in the background can lead to system crashes or general system instability.

Automated Log Management and Analysis using Splunk for Computer Incident Investigations

/
Splunk - I define “Log Analysis” as a process of collecting system logs (syslog) and event data from computer systems, network devices and applications to look for anomalous events that are malicious or are in violation of organizational policies.

Personal Security on Social Networking Sites

/
Visits to social networking sites account for more than 10% of the total time people spend on the Internet, according Nielsen Online. A social network site focuses on building online communities of people who share common interests and activities, such as Linkedin.com and Facebook.com. Facebook is now the most visited social networking site on the Internet, with nearly 1.2 billion visits in January 2009 alone, while Twitter and Linkedin are steadily gaining ground.

Microsoft Security Bulletin Summary for July 2010

/
This security update resolves a publicly disclosed vulnerability in the Windows Help and Support Center feature that is delivered with supported editions of Windows XP and Windows Server 2003. This vulnerability could allow remote code execution if a user views a specially crafted Web page using a Web browser or clicks a specially crafted link in an e-mail message. The vulnerability cannot be exploited automatically through e-mail. For an attack to be successful, a user must click a link listed within an e-mail message.

Microsoft’s Next Move for Windows – Samara Lynn

/
Microsoft has bounced back into good grace from Windows Vista with its latest release of its operating system, Windows 7. Many Windows-based users have adopted Windows 7, either upgrading from Windows XP or scraping Vista. In an interesting article titled, “Will Windows 8 Be A Business-Only OS?” from PC Mag, Samara Lynn discussing Microsoft’s potential next move.