Interface weakness opens servers to attacks

A critical vulnerability in the intelligent platform management interface (IPMI) used by administrators to remotely control computer systems poses a significant threat to rack servers and cloud services running on those servers, according

Share on LinkedIn Share with Google+ Comment on this article Published on: July 22nd, 2013 nestor e. arellano

Metadata more revealing than content: Ontario privacy chief

If politicians claim that the public has nothing to worry about metadata surveillance is harmless because the practice not pry into the content of private communications, they’re wrong.That’s the gist of a paper

Share on LinkedIn Share with Google+ Comment on this article Published on: July 18th, 2013 nestor e. arellano

HP uses big data to detect persistent threats

There is no shortage of vendors offering big data analytics solutions designed to help enterprise companies enhance revenue-boosting decision processes, but Hewlett-Packard is extending big data analytics capability further to security applications.The Palo Alto,

Share on LinkedIn Share with Google+ Comment on this article Published on: July 16th, 2013 nestor e. arellano

How secure is SSL?

One of the fallouts from the leaks by former NSA consultant Edward Snowden is that people are paying more attention now to what data intelligence agencies are collecting.In the wake of a report

Share on LinkedIn Share with Google+ Comment on this article Published on: July 8th, 2013 Howard Solomon

Many SSL connections lack added protection?

Companies and individuals rely on the SSL (secure socket layer) encryption to secure passwords, credit card information and other personal and sensitive information. However, many organizations have no way of protecting their data

Share on LinkedIn Share with Google+ Comment on this article Published on: July 8th, 2013 nestor e. arellano

Time to beef up federal privacy law, says Stoddart

Canada’s federal privacy law is only 12 years old but it needs to be overhauled, says the country’s privacy commissioner.“As organizations find new ways to profit from personal information, the risks to privacy

Share on LinkedIn Share with Google+ Comment on this article Published on: May 23rd, 2013 Howard Solomon

McAfee offers biometric security for cloud storage

McAfee Inc. is rolling out a product that will secure files stored in the public cloud with the use of biometric authentication.LiveSafe will provide users with 1 GB of online storage that can

Share on LinkedIn Share with Google+ Comment on this article Published on: May 14th, 2013

WhatsApp violates privacy law, says Stoddart

WhatsApp, a widely used instant messaging mobile application similar to Research in Motion’s BlackBerry Messenger, violates Canadian privacy laws and potentially puts user information in danger, according to Privacy commissioner Jennifer Stoddart.A joint

Share on LinkedIn Share with Google+ Comment on this article Published on: January 28th, 2013

EMC now offers security consulting

EMC announced today the availability of security consulting services that will aid enterprises in avoiding risk and achieve business objectives. The Hopkinton, Mass.-based company will offer five solutions stemming from EMC’s RSA security

Share on LinkedIn Share with Google+ Comment on this article Published on: April 7th, 2008 Briony Smith