Monthly Archives: February 2009

Protection Poker: Game to Secure Application Development

Researchers from NC State have developed a new approach to discover the risk assessment in software security and ensure the application development safety. This new system is called Protection poker and designed to help developers to determine the possible location

Gartner Says Consumers Are Unwilling to Sacrifice Convenience for Security, Despite Widespread Online Fraud

Two-Thirds of U.S. Consumers Surveyed Use the Same One or Two Passwords for All Web Sites Although consumers claim to be concerned about security, they have little tolerance for sacrificing convenience to safeguard that security, according to Gartner Inc. Despite

New Excel 0-day being exploited in the wild

Symentic reported that there is a new 0day vulnerability in Microsoft Office Excel (other versions may be affected as well).Symantec is saying that the vulnerability is being exploited by a variant of the Mdropper trojan, which they are calling Trojan.Mdropper.AC.

Research Reveals Significant Savings Potential for Information Security and Audit

The IT Policy Compliance Group (IT PCG) today announced the availability of its latest benchmark research report titled, “Managing Spend on Information Security and Audit to Improve Results.”Based on research conducted with more than 2,600 firms, the study reveals that

DNS Poisoning

security researcher Dan Kaminsky who works at security services firm IOActive, said this week at BlackHat that the time may have come for IT vendors and users to consider broad adoption of the more-permanent security protections offered by DNS Security

Acrobat Reader 0-Day

According to Shadowserver, There is a new Acrobat 0-day in the wild. They say you can avoid it by turning off Javascript inside of your Adobe Acrobat products. Please see Shadowserver’s write up: here for more information

Facebook security settings

Facebook and other social networking sites can be a great way of keeping in touch with former friends from high school, university and various jobs. But using such sites does come with different risks. Here you can find some best