Security News > 2010 > February

Forwarded from: "Lennon, Elizabeth B." ITL BULLETIN FOR FEBRUARY 2010 SECURE MANAGEMENT OF KEYS IN CRYPTOGRAPHIC APPLICATIONS: GUIDANCE FOR ORGANIZATIONS ÎÂ Shirley Radack, Editor Computer...

+----------------------------------------------------------------------+ | LinuxSecurity.com Linux Advisory Watch | | February 26th, 2010 Volume 11, Number 9 | | | | Editorial Team: Dave Wreski |...

http://www.nbcchicago.com/news/business/united-twitter-hack-85544162.html By BJ LUTZ NBC Chicago Feb 26, 2010 The Twitter account for United Airlines on Friday morning was among several notable...

http://www.washingtonpost.com/wp-dyn/content/article/2010/02/19/AR2010021902643.html By Ellen Nakashima Washington Post Staff Writer February 20, 2010 Some of the computer codes used in the recent...

http://www.dailymail.co.uk/news/worldnews/article-1252738/Argentinian-hackers-plaster-countrys-flag-Falklands-newspaper-website-new-conflict-begins.html By David Gardner The Daily Mail 21st...

http://articles.latimes.com/2010/feb/17/nation/la-na-cyber-attack17-2010feb17 By Bob Drogin The Los Angeles Times February 17, 2010 Reporting from Washington -- The crisis began when college...

http://www.krebsonsecurity.com/2010/02/hackers-steal-150000-from-mich-insurance-firm/ By Brian Krebs Krebs on Security February 16th, 2010 An insurance firm in Michigan lost nearly $150,000 this...

http://www.washingtonpost.com/wp-dyn/content/article/2010/02/14/AR2010021403817.html By Ellen Nakashima Washington Post Staff Writer February 15, 2010 More private computers were commandeered by...

http://www.tribuneindia.com/2010/20100212/main7.htm By Vijay Mohan Tribune News Service February 11, 2010 Computer networks at sensitive establishments have experienced a second wave of cyber...

Forwarded from: Vic Vandal H4x0rs, InfoSec professionals, script kidz, n00bs, and posers: CarolinaCon is back for its 6th impressive year! For the price of your average movie admission with...