New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 1011
Comments: 21
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image cybsec: Weekly Summaries: - Weekly summary - image
Cyber Security


It is not the answer that enlightens, but the question.
Eugene Ionesco (1912-1994); Romanian-French dramatist.

- Weekly summary -
Oxygen3 24h-365d, by Panda Software (http://www.pandasoftware.com)

Madrid, April 3, 2004 - This week, Oxygen3 24h-365d has focused on the news
summarized below, which can be accessed at:
http://www.pandasoftware.com/about/press/oxygen3/oxygen.asp

- Cisco warns that code for exploiting vulnerabilities has been released
(03/29/04).
Cisco has reported that code for exploiting several vulnerabilities that
affect its products has been published. All of the vulnerabilities, except
the Cisco 675 Web Administration Denial of Service Vulnerability, have
already been fixed by Cisco. Therefore, all users of these devices are
advised to update them as soon as possible. Cisco is currently researching
the vulnerability that has not yet been fixed and will shortly release the
corresponding solution.

- Mobile devices and security in corporate networks (03/30/04).
New generation cell phones, PDAs or laptop computers are the mobile devices
most commonly used by corporate network users. Even though their advantages
speak for themselves, they also pose potential risks -theft, gateways for
viruses and intruders, etc.- to companies whose security policies do not
contemplate the configuration and protection systems of these devices.

- Beta version of Windows XP Service Pack 2 (03/31/04).
Microsoft has published a beta version of Windows XP Service Pack 2 (SP2)
for IT professionals to evaluate. This version of SP2 includes all of the
security updates released to date, as well as new functionalities. These new
functionalities include pop-up blocking, an enhanced firewall, which will be
turned on by default, and a center that provides information and protection
against the most common problems.

- Web-managed antivirus solutions (04/01/04).
Controlling the antivirus protection installed on laptop computers, which
are not permanently connected to a corporate network, is a serious problem
that network administrators need to solve. In fact, when these devices
connect to external networks they are not protected by the perimeter
protection installed in the local network and cannot be controlled by
systems administrators. However, nowadays there is a way of getting around
this obstacle that up until now has made administrators' jobs difficult.
Advanced technologies are now available that can be managed via the
Internet, allowing administrators to remotely control and monitor antivirus
solutions, even if the laptop is connected to the Internet on the other side
of the world.

- Human error and security breaches (04/02/04).
According to the second annual study carried out by Computing Technology
Industry Association (CompTIA), which is also reported in The Register, the
majority of security breaches stem from human error. Over the last six
months, 58 percent of those surveyed have suffered at least one major IT
security breach. This is a significant increase compared to last year's
study, when this figure was 38 percent. Furthermore, 84 percent of the
organizations polled blame human error either wholly or in part for their
last major security breach. Last year, 63 percent of those surveyed cited
human error.

NOTE: The address above may not show up on your screen as a single line.
This would prevent you from using the link to access the web page. If this
happens, just use the 'cut' and 'paste' options to join the pieces of the
URL.
Posted on Sunday, 04 April 2004 @ 12:49:24 EDT by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· Microsoft
· Microsoft
· HotScripts
· W3 Consortium
· More about Cyber Security
· News by phoenix22


Most read story about Cyber Security:
Booby Trapped software!

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register