-
December 17, 2013
Why AT&T says it can deny Google Fiber access to its poles in Austin
Why AT&T says it can deny Google Fiber access to its poles in Austin: Google’s quest to build a fiber network in Austin, Texas has hit a snag in the form of AT&T. AT&T owns about 20 percent of the utility poles in Austin, with the rest of them being owned by the city. Instead […]
-
December 17, 2013
Facebook wants to know why you didn’t publish that status update you started writing
Facebook self: Unfortunately, the code in your browser that powers Facebook still knows what you typed—even if you decide not to publish it.* It turns out that the things you explicitly choose not to share aren’t entirely private. Facebook calls these unposted thoughts “self-censorship,” and insights into how it collects these nonposts can be found […]
-
December 17, 2013
Configuring the php.ini file properly
Configuring the php.ini file properly: An important step in hardening the PHP environment is configuring the php.ini file properly and disabling functions that may be useful to an attacker but not necessary to the application. However, make sure that PHP is patched at least to version 5.4.0 because major security-relevant changes have been made beyond […]
-
December 17, 2013
Why AT&T says it can deny Google Fiber access to its poles in Austin
Why AT&T says it can deny Google Fiber access to its poles in Austin: Google’s quest to build a fiber network in Austin, Texas has hit a snag in the form of AT&T. AT&T owns about 20 percent of the utility poles in Austin, with the rest of them being owned by the city. Instead […]
-
December 17, 2013
NSA phone surveillance program likely unconstitutional, federal judge rules
NSA phone surveillance program likely unconstitutional, federal judge rules: A federal judge in Washington ruled on Monday that the bulk collection of Americans’ telephone records by the National Security Agency is likely to violate the US constitution, in the most significant legal setback for the agency since the publication of the first surveillance disclosures by […]
-
December 17, 2013
How hackers made minced meat of Department of Energy networks
How hackers made minced meat of Department of Energy networks: A Department of Energy network breach earlier this year that allowed hackers to download sensitive personal information for 104,000 people was the result of a decade-old patchwork of systems, some that hadn’t installed critical security updates in years, according to a federal watchdog. July’s successful […]
-
December 17, 2013
Moving Beyond SIEM For Strong Security Analytics
Moving Beyond SIEM For Strong Security Analytics: While security information and event management (SIEM) tools have certainly helped many an enterprise IT organization get a better handle on aggregating and analyzing logs across disparate security tools, these organizations are starting to butt up against the limitations of SIEM. And as enterprises seek to gain more […]
-
December 17, 2013
UK national security adviser to propose tighter rules after Huawei concerns
UK national security adviser to propose tighter rules after Huawei concerns: The British Prime Minister’s national security adviser, Kim Darroch, is expected to propose that ministers have the final decision on deals that affect critical national infrastructure, the Financial Times said, citing sources. The move comes after the parliament’s security committee raised concerns about a […]
-
December 17, 2013
Apple releases OS X 10.9.1 with Mail, Safari, and VoiceOver fixes
Apple releases OS X 10.9.1 with Mail, Safari, and VoiceOver fixes: Nearly two months after the initial release of Mavericks, Apple has issued the first major update for the operating system. OS X 10.9.1 can be downloaded automatically through the Mac App Store’s Updates tab, but if you’d like to install it manually the package […]
-
December 17, 2013
BIOS Malware that can remotely destroy any computer, NSA claimed
BIOS Malware that can remotely destroy any computer, NSA claimed: During a CBS Interview show “60 Minutes”, The National Security Agency (NSA) officials claimed that China has developed a BIOS based malware that can remotely destroy any computer. Obviously NSA is struggling to repair its image and in an effort to justify their extensive Surveillance programs, The NSA Director General […]