Monday, September 25, 2006

Medical sector failing to embrace the internet

Patients want electronic access to medical records.
Full Article:

Hijacked consumer machines target the enterprise

The digital underground has learned that the best way to strike gold is to target consumers blissfully unaware that their desktop applications are riddled with security holes. By hijacking as many consumer desktops as possible, the bad guys can expand their botnets and use them to burglarize big enterprises with deep pockets.
Full Article...

Tuesday, September 19, 2006

UK firms admit to email management 'chaos'

Over a third of large organisations in the UK admit that their email management system is in "complete chaos", a poll has claimed.
Full Article:

The Global State of Information Security 2006

Some things are getting better—slowly—but security practices are still immature and, in some cases, regressing.
Full Article...

Spyware, Bots, Rootkits Flooding Through Unpatched IE Hole

The newest zero-day flaw in the Microsoft Windows implementation of VML (Vector Markup Language) is being used to flood infected machines with a massive collection of bots, Trojan downloaders, spyware and rootkits.
Full Article:

Friday, September 15, 2006

Unisys Computer Recovered

The Office of the Inspector General of the Department of Veterans Affairs is reporting that an office computer reported stolen from a Unisys Corp. office in Virginia has been recovered, and a Washington, D.C., resident has been arrested in the case.
Full Article:

Nikon magazine hit with security breach

The breach, which lasted nine hours on Tuesday, revealed the personal and financial information of 3,235 subscribers.
Full Article...

Wednesday, September 13, 2006

UK bank hit by massive phishing attack

Customers of Barclays Bank have been alerted to a range of phishing emails designed to steal online banking details.
Full Article:

Survey: Large U.S. firms collecting more personal data

The largest U.S. companies appear to be gathering more personally identifiable data about their online customers, but fewer of them are sharing it with outside organizations, according to the fifth annual review of Fortune 100 companies conducted by The Customer Respect Group Inc. in Ipswich, Mass.
Full Article...

Monday, September 11, 2006

Keep your Job by avoiding....The six worst security mistakes

From Network World: We asked the top security experts in the industry - people who consult with enterprise customers on a regular basis - to name the most common security mistakes that companies make. Here's their list, as well as actionable advice on how to avoid making a major security gaffe
Story 1: Not having a comprehensive security architecture
Story 2: Not investing in training
Story 3: Neglecting identity management
Story 4: Ignoring the threat from insiders
Story 5: Not protecting Web apps
Story 6: Buying products based on bells and whistles

IT execs feel the heat as security woes multiply

Here's a very interesting story from Network World. IT execs are now starting to lose there jobs as a result of security breaches. Gone are the days of ignorance.

AOL fired a researcher and a manager last week, and CTO Maureen Govern resigned after the Dulles, Va., company posted data on search queries made by 650,000 AOL subscribers. Ohio University dismissed two senior IT people this month following news of five security vulnerabilities that exposed the sensitive records of 137,000 alumni.

Full Story...

Thursday, September 07, 2006

Portable data menace goes unchecked

Companies without appropriate controls to manage data on portable devices are leaving themselves "wide open" to security breaches and possible prosecution, a security expert told today.
Full Article:

Is your BlackBerry as secure as you think?

A small shock wave went through the community of BlackBerry users recently when a consultant showed off a way to use the popular wireless technology to circumvent a network's defences and attack its core computers.
Full Article:

Complacency Increases Security Risk

IT security managers should never be complacent about existing technologies because threats can dramatically change in such a short time, according to the security head of Australian wealth management company Asgard.
Full Article...

Wednesday, September 06, 2006

Calif. Man Says He Hacked USC Application System

Eric McCarty, a 24-year-old San Diego, Calif., resident, on Tuesday admitted in court that he hacked into a University of Southern California (USC) student application system in June 2005 after being denied admission to the school, the Associated Press reports via
Full Article:

Cisco, Microsoft demo network security cooperation

It has taken nearly two years, but Microsoft Corp. and Cisco Systems Inc. are finally ready to demonstrate how their network access security products will work together.
Full Article:

Government Report Finds Health Care Privacy Breaches Rampant

Agencies and contractors that experienced privacy breaches collectively have access to medical data for more than 100 million Americans.
Full Article...

Tuesday, September 05, 2006

Intel vPro Promises VARs and MSPs Less Needy Desktops

Intel aims to change the corporate desktop landscape with its vPro platform.
Full Article:

Word flaw hit with zero-day attack

An "extremely critical flaw" in Microsoft Word 2000 is currently being exploited by malicious attackers, which could lead to remote execution of code on a user's system, security researcher Secunia advised Tuesday.
Full Article...

FBI Prepares For Phase One Of Controversial Sentinel Program

A critical design review next month will determine whether the FBI will move forward with the program.
Full article:

About Me

Choose Dyrand Systems as your virtual IT department and focus on growing your business—not on the technology that supports it. You deserve peace of mind when it comes to IT. When you choose Dyrand, you’re choosing more than just an IT firm—you’re choosing an extension of your own team.