Application Security — Features

CA ties management suites to Amazon's cloud

There's no question that cloud-computing infrastructures will become a significant part the IT plans of large corporations, according to analysts. The question, at least right now, is how well those hybrid internal/external infrastructures will be managed.

Kevin Fogarty | 13 Aug | Read more

Data centers go underground

As Hurricane Ike bore down on Houston one Friday last September, the Continental Airlines' flight operations center, located on the 14th floor of a glass-sided downtown high rise, suddenly went dark. For the airline's pilots and flight crews, however, business proceeded as usual.

Robert L. Mitchell | 29 Jul | Read more

4 ways to catch a liar

Most people lie, whether they're covering up something sinister or just embarrassed over a mistake. Research conducted a few years ago at the University of Massachusetts found that 60 percent of participants lied at least once during an observed 10-minute conversation.

Joan Goodchild | 28 Jul | Read more

How to build your own digital forensics lab, cheap

All too frequently a peer will contact me in a panic about recovering deleted files from a suspect's hard drive--after my peer has trampled on the digital evidence like a rookie police officer at his first crime scene. Often valuable evidence is lost for good,or unusable in court; or worse, the suspect knows he is being investigated.

Brandon Gregg | 23 Jul | Read more

Mind games: how social engineers win your confidence

Social engineering and mind games expert Brian Brushwood has not come by his knowledge in the traditional manner of school or business training. Brushwood is the host of the Internet video series Scam School, a show he describes as dedicated to social engineering in the bar and on the street.

Joan Goodchild | 23 Jul | Read more

Swine flu: watching for signs of H1N1 havoc

At companies in the North America, Europe and northern Asia, swine flu may be the last thing on the minds of those in charge of security, pandemic planning and disaster preparedness. After all, it's summer and flu season is still months away.

Bill Brenner | 23 Jul | Read more

A 'whac-a-mole' approach to security

If you've ever played the silly, maddening game known as "Whac-A-Mole," you know what futility feels like. As you smack one mole with the mallet, up pops another one. Their speed and number escalates as you flail away, trying to keep up. At some point, you realize there's no hope of winning.

Maryfran Johnson | 23 Jul | Read more

E-commerce Fraud: The Latest Criminal Schemes

E-commerce fraud costs retailers approximately $4 billion each year, according to the most recent results of an annual survey conducted by Cybersource, a provider of electronic payment and risk management services. Sebbe Jones, manager of fraud and disputes at 2Checkout, is in the business of keeping e-commerce fraud at bay.

Joan Goodchild | 17 Jul | Read more

Weather stations will use mobile infrastructure

For most of us, not knowing what the weather is going to do might at worst result in a soggy barbecue or a washed-out cricket or football match. For a farmer in the developing world it could result in the loss of an entire harvest which, at best, makes life that much harder or, at worst, brings on financial ruin or considerable human suffering. If enough farmers over a wide geographical area are affected, widespread famine becomes a very real possibility.

Ken Banks | 21 Jul | Read more

5 Facebook, Twitter scams to avoid

<em>According to research recently conducted by security firm Webroot, approximately three in ten social network users have experienced some form of a security attack, such as a virus infection or a phishing scam, on a social network in the last year. As the popularity of these social networks explodes, and more organizations ease restrictions among employees (See: ), they become more attractive for criminals seeking access to private information that can be used for profit. CSO asked two social network security experts for some of the latest scams found on Facebook and Twitter, and how to recognize and avoid them (For more tips to stay safe see: Seven Deadly Sins of Social Networking).</em> <a href="http://www.csoonline.com/article/482963/Facebook_Twitter_LinkedIn_Security_Pros_Warm_to_Web_._Access"/>

Joan Goodchild | 14 Jul | Read more