Popular Tags, Blogs, and Videos about security tags

Obama’s Pick for Treasury Secretary Did Not Pay Taxes

JONATHAN WEISMAN, Wall Street Journal:Timothy Geithner didn’t pay Social Security and Medicare taxes for several years while he worked for the ... for RuggedNews.com, 2009. | Permalink | No comment | Add to del.icio.us Post tags: Feed enhanced [more...]

Date: 2009-01-15 03:20:43

Blog posts (151) | Videos (109)
 


How to Edit/Delete A System File in Windows Vista

There are few security features in Windows Vista like User Account Control that are meant to be there to better protect computer from any malicious ... require your CMD command. b) Security Tab This solution might seem a bit complicated but it helps ... on the properties. Select Security Tab. 2) Click the Advanced button at the bottom half. 3) [more...]

Date: 2009-01-08 01:17:16


Gates of Vienna News Feed 1/13/2009

Check out tonight’s “behavioral sink” stories from the UK. Every night there are at least a few, but tonight seems to have more than its share ...  Europe and the EUEurope Develops RFID License Plate TrackingItaly: WWII Supreme Court Explains Why ... : Threatened Algerian Writer One Year in ItalyTunisia: Emigrant Revenue Grows by 10% in 2008 Israel [more...]

Date: 2009-01-14 04:58:00


Think NFC is Just Ticketing and Payments? Think Again.

Near field communication (NFC) is a viable enabling technology for activities ranging from securely exchanging medical records to popping perfect ... is a wireless communication technology with only a few inches of range. It is most commonly used for contactless ... then described a potential use case where an NFC RFID tag is embedded in microwave [more...]

Date: 2008-11-20 16:13:17


"Smart Power" And The End of American Exceptionalism

There were two very telling quotes by Secretary of State designate Hillary Clinton during today's Senate confirmation hearings as to the nature of ... of smart power in the Middle East that addresses the security needs of Israel and the legitimate political ... humanity as a way to achieve greater security." It is a marriage of principle and pragmatism [more...]

Date: 2009-01-14 04:58:52


Google + P&G = RFID + data mining

Parallelnormal is not encouraged by the companies’ new innovation-idea-swapping agreement. All in it together. CC/Kenneth Lu This item ( ... to bear RFID tags, which for the first time will match each of us to the individual items ... Media Info Center Posted in Big Brother, Globalism, Homeland Security, Personal tech, Privacy, RFID [more...]

Date: 2008-11-29 22:43:56


Insecure by design

Despite the availability of robust and secure solutions, organizations persist in implementing insecure design in a bid to save on cost ... Nate Lawson was concerned about the privacy implications of the popular RFID-based FasTrak toll tags ... of the card is kept in backend servers, this in fact exacerbates the plight of victims.  Hackers [more...]

Date: 2008-12-23 09:00:36


tikitag: address security and privacy in alpha

Contributed by Joanne C. Kelleher Alcatel-Lucent Ventures, which commercializes research developed in Bell Labs, is launching tikitag ... physical objects with online information and applications. Starter kits containing an NFC reader, 10 ... that the tikitag is a HF RFID tag operating at 13.56MHz with a read range of about 4 cm.  For now, only [more...]

Date: 2008-09-19 20:34:34


New RFID SD Card for Mobile Market Unveiled

"RFID usage has been widely deployed in inventory tracking and supply chain management as well as some health care and security checking in consumer market. In view of the high demand, DAILY RFID, a China based leading supplier for RFID devices ... hardware change. The SD format based RFID reader is compatible with 13.56MHz RFID tag in various formats [more...]

Date: 2008-11-17 03:22:02


3 reasons you need a WAF even if your code is (you think) secure

Everyone is buzzing and tweeting about the SANS Institute CWE/SANS Top 25 Most Dangerous Programming Errors, ... of security. Or is there? Web application firewalls, while certainly providing a layer of security against ... by SANS, also provide other benefits in terms of security that should be carefully considered before [more...]

Date: 2009-01-14 12:21:48


1265 News Update (January 14th, 2009)

Since a lot seems to have happened in the last two days, instead of writing a post about every news item I will just combine them all into one post. 1) We’ll begin with the fact that the Packers have a new special teams coordinator. The Packers decided to promote Shawn Slocum to special teams coordinator after Mike Stock’s “retirement” [more...]

Date: 2009-01-14 23:06:18


The End of Privacy?

I've written an article for the September issue of Scientific American magazine called The End of Privacy? ... : Tools of the Spy Trade Katherine Albrecht, How RFID Tags Could Be Used to Track Unsuspecting People ... in an Age of Terabytes and Terror Esther Dyson, How Loss of Privacy May Mean Loss of Security Anna [more...]

Date: 2008-08-20 03:15:52


Hospital hazards, "Holy Crap" Department

We take for it granted that technology can be used to tag objects in various ways, useful and otherwise. The anti-theft devices used on retail clothing stores are a familiar example. Radio Frequency Identification Devices (RFID) are used for this purpose as well as for security access. I have a device [more...]

Date: 2008-06-29 19:49:32


Websites I Found Interesting - Diigo 01/14/2009

Update: Microsoft updates free tool to remove persistent worm | InfoWorld | News | 2009-01-14 | By Jeremy Kirk, ... , security, MSRT, educationThe 5 Stages Of Twitter Acceptance. Where are YOU at? | Blog of Mr ... , you do secretly wonder if it will be around all that long. tags: twitter, tweet, adoption, microblogging [more...]

Date: 2009-01-14 23:30:00


Researchers Reveal Security, Privacy Vulnerabilities in ‘Enhanced’ Driver’s Licenses

Researchers Reveal Security, Privacy Vulnerabilities in ‘Enhanced’ Driver’s Licenses November 4th, ... , it is a technically straightforward matter to copy the data from a Passport Card’s RFID tag into another, off ... an individual’s citizenship status. They are also equipped with radio frequency identification (RFID [more...]

Date: 2008-11-04 09:12:38


RIM warns of BlackBerry PDF processing vulnerabilities

Hackers can use booby-trapped PDF attachments sent to BlackBerry devices to launch malicious code execution attacks, according to warnings issued by Research in Motion (RIM). The company shipped patches this week to address a pair of critical vulnerabilities affecting its enterprise product line [more...]

Date: 2009-01-14 15:48:20


One For Jay Leno

Jay Leno gets quite a kick out of the stupidity of common criminals, ... Account Security Measures Dear User, We are sorry to inform you that we care currently working ... © 2008 Yahoo. All rights reserved. Copyright/IP Policy | Terms of Service | Guide to Online Security [more...]

Date: 2009-01-14 16:59:20


Follow Up : Day No.19 …over 1000

When I returned home from work about 4.30 PM CLT the death toll was 993 !! I told mom “well I bet it is more than 1000 if we count those who are under the destroyed buildings”, I went to sleep as today I have up till now terrible headache, I woke up and I found the death reached to 1013 !! [more...]

Date: 2009-01-14 20:42:00


Pentagon Comments on Iraq Quarterly Report

News in Balance:WASHINGTON, Jan. 14, 2009 -- The lack of essential services has replaced security as the major concern in Iraq, ... released yesterday.The report to Congress, titled “Measuring Stability and Security in Iraq,” said the security situation in the country continues to improve. The report covers the period through the end [more...]

Date: 2009-01-14 18:03:00


Mythbusters Silenced by Credit Card Companies

A Mythbusters episode entailing an analysis of RFID tags (and how easily they're hacked) ... =1 QuoteAlthough it's no secret that RFID is easily hacked (see: train passes, passports, credit cards ... was all set to do a show exposing the weak security behind most RFID implementations but was shut down [more...]

Date: 2008-09-03 21:36:24


Easily and Safely Optimize Vista by Disabling Unnecessary Vista Services

When you install Microsoft Windows Vista for the first time, ... applications, performance problems, security risks or in some cases a total system crash. I wouldn’t advice ... and security with a simple mouse click, by tweaking Windows services in an automatic and a very safe way [more...]

Date: 2009-01-11 08:00:12


F-Secure and Nokia to protect and manage TeliaSonera’s corporate handsets

Two renowned Finnish companies, Nokia and F-Secure, have joined forces to protect the enterprise mobile users of TeliaSonera, ... of TeliaSonera’s enterprise clients can benefit from the new services, but all of the carrier’s handsets in use ... gets first full review, looks like a phone for the ladies RFID Tags for Apple devices. Wi-Fi [more...]

Date: 2008-09-17 21:24:55


Accuracy is important. Vulnerabilities not so much.

Heh. Got you reading, didn't I? The point of this blog post is short and sweet ... errors, it wouldn't include many of these. "OMG!" shouts the security twit, "don't you care about security?" Of course I do, but let's talk just a wee bit of honesty here... Security is not job [more...]

Date: 2009-01-14 21:22:47


20+ Great Adobe AIR Apps for Photos & Videos

& Adobe AIR is proving more and more useful all of the time. A slew of tools are targeted towards designers and developers, but AIR apps can also be used for photo and video enthusiasts. Whether it be for video editing, simple playback, or organizing and browsing your photos, there seems to be an application to suit everyone’s needs [more...]

Date: 2009-01-14 20:23:47


Engine Yard takes Ruby and Rails to Amazon’s cloud bandwagon

Engine Yard takes Ruby and Rails to Amazon’s cloud bandwagon Posted by Larry Dignan @ 6:12 am Categories: General, Software Infrastructure, Web Technology Tags: Amazon.com Inc., Ruby, Vertebra, Scripting Languages, Software/Web ... . It features security policies, process automation, a federated design and distributed auditing [more...]

Date: 2009-01-14 14:12:51


Infuriating, but unsurprising

I've been talking about RFID as a security risk for a long time now.. ... to NOT have this "feature"....So I have an RFID blocking wallet, and passport folio.Labels: Geek, Money, Mythbusting ... . Now, my card companies have sent me two cards that have RFID tags in them, without my requesting [more...]

Date: 2008-09-01 01:05:00


Wire: US Military Report Warns 'Sudden Collapse' of Mexico Possible

News in Balance:WASHINGTON. Jan. 14, 2009 -- Writing in an article published by the El Paso Times, ... ) on worldwide security threats.USJFCOM's "Joint Operating Environment (JOE 2008)" report, which ... implications for homeland security alone."In an equally dangerous worst-case scenario, the report also [more...]

Date: 2009-01-14 15:53:00


Mythbusters Gagged: Credit Card Companies Kill Episode Exposing RFID Security Flaws

This is our 6,000th post on Wilson's Blogmanac. Thanks to Baz le Tuff for tipping me off about this story about RFID, ... before. The IDTechEx report Active RFID predicts that sales of active RFID systems, including tags ... s boom times ahead Sales of technologies based on RFID (Radio Frequency Identification, the automatic [more...]

Date: 2008-09-03 21:45:34


Save Soapblox!

From the diaries - Todd You know how some politicians are fond of saying "you can't solve a problem by just throwing money at it." Well, here is a problem you can solve by throwing money at it. Send in a contribution to save Soapblox now!. More in the extended entry.Why is Soapblox Important? [more...]

Date: 2009-01-09 19:26:48


Free Quicken Online Review and Quicken 2009 Discount Coupon Codes

Quicken 2009 Discount Coupons and Promo Codes Listed Below The editors at CNN Money recently examined and reviewed several of the top online ... been created and spun off as an online web app by Intuit, the same financial software maker that brought us the popular desktop money management tool Quicken, and ubiquitous tax preparation program [more...]

Date: 2009-01-08 01:37:56


FREE DEVELOPER CONFERENCE - Houston TechFest

FREE DEVELOPER CONFERENCE - Houston TechFest Heere ye, heere ye!  Houston TechFest is right around the corner! ... as Java, Security, TDD, Methodology and more.  I think they’re even going to have an “Open Spaces” ... -RealTime resource management, Robotics Studio, OWASP Security Threats, Virtual Worlds, and XNA [more...]

Date: 2009-01-14 23:06:17


Back to Basics: Minimum Connection Time

With all the tools available for booking travel online, more and more people choose to do it themselves rather than use the services of a travel agent. I think the ability to research, sleuth out the best and perfect deal, and make reservations yourself is a wonderful thing [more...]

Date: 2009-01-15 00:33:00


10 Great Implementations of Facebook Connect

Facebook Connect mania has swept the Internet! Why create an account on a random website when you can click a single button to join? That is the power of Facebook Connect, which allows websites, software, and even mobile devices to integrate with Facebook and send information both ways [more...]

Date: 2009-01-12 16:39:06


RFID-enabled Poker Table

Gambling has gotten all the more secure with a new RFID-enabled poker table, ... to that of televised games. Wireless RFID chips are located at the bottom of a table, while RFID tags are fitted on a few deck of car… toys mobile phone technology video games computers robot gizmo gadget [more...]

Date: 2008-12-22 01:52:07


Ex-officer testifies about Kosovo war crimes - Europe

Ex-officer testifies about Kosovo war crimes - Europe Posted by:Mark 3 minutes ago • Discuss BELGRADE, ... during the war and buried them in mass graves to cover up atrocities, a former senior Serbian security officer said in court Wednesday. Bodies Tags exofficer testifies kosovo [more...]

Date: 2009-01-14 14:29:31


Right Wing Showing More Signs of Weakness In Anti-Marriage Arguments

Right Wing Showing More Signs of Weakness In Anti-Marriage Arguments January 14, 2009 By: jaysays Category: Gay Marriage Rights, LGBT issues A lack of support in the first push to add a same-gender marriage ban to Indiana’s constitution makes no difference to the right in their efforts to deny homosexuals equal legal protection [more...]

Date: 2009-01-15 00:54:20


US Commander in Iraq Voices Concern over Election Meddling

News in Balance:WASHINGTON, Jan. 14, 2009 -- With violence levels greatly reduced, ... are preparing to support Iraqi security forces in the event of possible violence surrounding ... troops are prepared to work with Iraqis security forces, which have taken the lead to ensure [more...]

Date: 2009-01-14 19:18:00


US Airpower Summary, Jan. 14, 2009: C-130s Support Intra-Theater Airlift Missions

A C-130 Hercules taxis in at a Southwest Asia air base after completing a mission in support of Operation Iraqi Freedom ... and International Security Assistance Force in Afghanistan during operations Jan. 13, according to Combined ... flown in support of the ISAF and Afghan security forces, reconstruction activities and route [more...]

Date: 2009-01-14 18:12:00


Spam ubiquity - even your Lexus is no haven

Once again, the physical space in which you can expect (or even hope) ... Tags: botnet • car • Lexus • security • spam • Storm Related posts Semi-sentient Storm botnet fights ... SlashDot ; image by SecondPrint Productions Speaking of spam, computer security researchers in Germany [more...]

Date: 2009-01-13 10:43:25


Heise Security: Microsoft - Customers play "Russian roulette" with their systems

# Info World: Researchers hack into Intel's vPro Posted: 07 Jan 2009 08:58:38 # Threat Level: Weak Password Brings 'Happiness' to Twitter Hacker "An 18-year-old hacker with a history of celebrity pranks has admitted to Monday's hijacking of multiple high-profile Twitter accounts" Posted: 07 Jan 2009 08:58:21 # IAIK TU Graz: RFID Tag Emulators [more...]

Date: 2009-01-09 19:41:31


RFID-enabled Poker Table

Gambling has gotten all the more secure with a new RFID-enabled poker table, ... to that of televised games. Wireless RFID chips are located at the bottom of a table, while RFID tags are fitted on a few deck of car… gadgets for women technology quotes computers microsoft ibm zune watch [more...]

Date: 2008-12-22 01:26:26


Amazon EC2 launches Web-based management console

Amazon EC2 launches Web-based management console Posted by Larry Dignan @ 6:39 am Categories: General, Software Infrastructure, Web Technology, Amazon, Cloud computing Tags: Web, Password, Console, Amazon.com Inc., Management Console, Cloud ... are a security risk, but you can’t argue the ease of use. Personally, I wouldn’t want my infrastructure [more...]

Date: 2009-01-09 14:39:40


Obama’s new BlackBerry: The NSA’s secure PDA?

Posted by Declan McCullagh President-elect Barack Obama checks his BlackBerry while riding on his campaign bus in Pennsylvania last March. (Credit: Pete Souza/ Rapport Press ) Bill Clinton sent only two e-mail messages as president and has yet to pick up the habit. George W [more...]

Date: 2009-01-15 01:10:00


BTF Sniffer Is The Ultimate Software To Reveal And Delete Traces

It does not happen very often that we review a software that does not come with an English user interface ... or Security and Control. The right pane will display all traces of the specified category ... to del.icio.us Post tags: btf sniffer, ccleaner, free software, portable software, system cleaner, traces [more...]

Date: 2009-01-15 03:15:05


Breaking News–Joey de Venecia harassed in Cebu!

As I’m writing my earlier entry, I received numerous frantic texts from Mr. ... . It appears that Joey’s security is compromised and there are reports that air force officials want ... . JM Sarselejo, Mactan airbase officials and security approved the school forum but “higher [more...]

Date: 2009-01-14 14:28:32


Microsoft study debunks phishing profitability

Microsoft study debunks phishing profitability Posted by Dancho Danchev @ 12:38 pm Categories: Hackers, Microsoft, Browsers, Spam and Phishing, Botnets, Passwords, Phishing Tags: Security, Phishing Emails, Online Fraud, Scams, Identity Theft ... machines or are they willing to sacrifice potential profit for the sake of their own security [more...]

Date: 2009-01-08 20:38:13


Zune Download Sites – The Top Zune Download Sites

Do you have a Zune media player? If you do, then you already know how entertaining and convenient it is, as it lets you listen to music everywhere you go, as well as watching movies or videos on it. Even if you’re on a trip in a remote location, you can still listen to music and watch your favorite movies on the Zune, [more...]

Date: 2009-01-14 20:56:30


Obvious Tags Twice Over

By Thoreau So, with all the violence in northern Mexico, two very different groups of public officials have proposed two very different solutions to the problem: 1)  The Department of Fatherland Security, last seen confiscating shampoo for the good [more...]

Date: 2009-01-10 18:40:12


UN troops to replace EU force in Chad, Central African Republic - World news

UN troops to replace EU force in Chad, Central African Republic - World news Posted by:Tom 16 minutes ago • Discuss The UN Security Council voted unanimously Wednesday to deploy ... Republic (EUFOR) in mid-March. Resolution 1861 also decided to extend for one year until March Tags [more...]

Date: 2009-01-14 18:39:26


Microsoft planning quiet Patch Tuesday (1 critical)

Microsoft planning quiet Patch Tuesday (1 critical) Posted by Ryan Naraine @ 10:32 am Categories: Patch Watch, Microsoft, Windows Vista, Browsers, ... of Service (DoS), Arbitrary Code Execution, Complex Attacks, Research Tags: Microsoft Windows Server, Microsoft Corp., Microsoft Windows, Operating Systems, Security, Servers, Software, Hardware, Ryan [more...]

Date: 2009-01-08 18:32:08



51 - 100 of 151 Posts
Page: First | < Preceding | Next >
0 | 1 | 2