Friday, February 15, 2013Amazon Redshift offers budget cloud data warehouse With on-demand pricing starting at 85 cents per hour, Amazon is pitching Redshift to large enterprises as a low-cost alternative to traditional data warehouse solutions
Thursday, January 31, 2013Smart phones a smart way to monitor patients, conference told Handsets loaned to patients can help hospitals cut cost and improve out-patient care, attendees at a mobile health care conference learned
Wednesday, January 09, 2013Yahoo now offers SSL By providing users Secure Socket Layer connection, Yahoo finally catches up with Microsoft and Google on Webmail security
Thursday, September 01, 2011Hackers may have stolen over 200 SSL certificates Source say DigiNotar breach generated fraudulent certs for Mozilla, Yahoo and Tor, not just Google
Tuesday, May 25, 2010This e-mail message will self-destruct in ... VaporStream's e-mail service uses encryption, SSL and RAM to send messages that vanish without a trace. The technology promises to meet confidentiality laws and reduce litigation costs, but an Info-Tech analyst says it could get companies into big trouble.
Wednesday, February 17, 2010Cloud security: Root of trust With cloud computing, you not only are vulnerable to attacks from the Internet or other tenants of your provider, but you have to trust your provider’s staff.
Monday, February 01, 2010Botnet targets Web sites with junk SSL connection The aim of the odd attack is unknown but it's not knocking the sites offline, the Shadowserver Foundation says. Experts say it’s part of the Pushdo botnet, which is used to send out spam but also capable of sending other malware to computers
Friday, November 20, 2009Security pro says new SSL attack can hit many sites Leviathan Security Group has developed generic attack code using the Authentication Gap bug, but launching an attack is very difficult and first requires a man-in-the-middle attack
Friday, November 13, 2009Opinion: Can the SSL vulnerability hurt you? There is a serious weakness in SSL and we need to be careful when selecting a security protocol. But we have seen no actual man in the middle attacks and researchers are working on the problem right now
Monday, August 10, 2009More holes found in Web's SSL security protocol At Black Hat, researchers say these bugs could be used with null termination certificates to create undetectable man-in-the middle attacks. Find out about the new vulnerabilities found by Dan Kaminsky