Sicurezza delle Infrastrutture IT
  • December 17, 2013

    Why AT&T says it can deny Google Fiber access to its poles in Austin

    Why AT&T says it can deny Google Fiber access to its poles in Austin: Google’s quest to build a fiber network in Austin, Texas has hit a snag in the form of AT&T. AT&T owns about 20 percent of the utility poles in Austin, with the rest of them being owned by the city. Instead […]

  • December 17, 2013

    Facebook wants to know why you didn’t publish that status update you started writing

    Facebook self: Unfortunately, the code in your browser that powers Facebook still knows what you typed—even if you decide not to publish it.* It turns out that the things you explicitly choose not to share aren’t entirely private. Facebook calls these unposted thoughts “self-censorship,” and insights into how it collects these nonposts can be found […]

  • December 17, 2013

    Configuring the php.ini file properly

    Configuring the php.ini file properly: An important step in hardening the PHP environment is configuring the php.ini file properly and disabling functions that may be useful to an attacker but not necessary to the application.  However, make sure that PHP is patched at least to version 5.4.0 because major security-relevant changes have been made beyond […]

  • December 17, 2013

    Why AT&T says it can deny Google Fiber access to its poles in Austin

    Why AT&T says it can deny Google Fiber access to its poles in Austin: Google’s quest to build a fiber network in Austin, Texas has hit a snag in the form of AT&T. AT&T owns about 20 percent of the utility poles in Austin, with the rest of them being owned by the city. Instead […]

  • December 17, 2013

    NSA phone surveillance program likely unconstitutional, federal judge rules

    NSA phone surveillance program likely unconstitutional, federal judge rules: A federal judge in Washington ruled on Monday that the bulk collection of Americans’ telephone records by the National Security Agency is likely to violate the US constitution, in the most significant legal setback for the agency since the publication of the first surveillance disclosures by […]

  • December 17, 2013

    How hackers made minced meat of Department of Energy networks

    How hackers made minced meat of Department of Energy networks: A Department of Energy network breach earlier this year that allowed hackers to download sensitive personal information for 104,000 people was the result of a decade-old patchwork of systems, some that hadn’t installed critical security updates in years, according to a federal watchdog. July’s successful […]

  • December 17, 2013

    Moving Beyond SIEM For Strong Security Analytics

    Moving Beyond SIEM For Strong Security Analytics: While security information and event management (SIEM) tools have certainly helped many an enterprise IT organization get a better handle on aggregating and analyzing logs across disparate security tools, these organizations are starting to butt up against the limitations of SIEM. And as enterprises seek to gain more […]

  • December 17, 2013

    UK national security adviser to propose tighter rules after Huawei concerns

    UK national security adviser to propose tighter rules after Huawei concerns: The British Prime Minister’s national security adviser, Kim Darroch, is expected to propose that ministers have the final decision on deals that affect critical national infrastructure, the Financial Times said, citing sources. The move comes after the parliament’s security committee raised concerns about a […]

  • December 17, 2013

    Apple releases OS X 10.9.1 with Mail, Safari, and VoiceOver fixes

    Apple releases OS X 10.9.1 with Mail, Safari, and VoiceOver fixes: Nearly two months after the initial release of Mavericks, Apple has issued the first major update for the operating system. OS X 10.9.1 can be downloaded automatically through the Mac App Store’s Updates tab, but if you’d like to install it manually the package […]

  • December 17, 2013

    BIOS Malware that can remotely destroy any computer, NSA claimed

    BIOS Malware that can remotely destroy any computer, NSA claimed: During a CBS Interview show “60 Minutes”, The National Security Agency (NSA) officials claimed that China has developed a BIOS based malware that can remotely destroy any computer. Obviously NSA is struggling to repair its image and in an effort to justify their extensive Surveillance programs, The NSA Director General […]

Categories

  • Hacks and Incidents
  • Security News
  • Security Techniques
  • Uncategorized

Copyright © 2025 by ISGroup SRL - All Rights Reserved