Study finds the task to be very difficult; overwriting or crypto-erasure seem the best methods for sanitizing SSDs
Until a university study emerged last week, few experts suspected that it's more difficult to erase data stored on solid-state drives (SSD) than that on hard disk drives (HDDs)...
cybersecurity
data overwrite
data sanitization
data security
drive management
drive sanitization
encryption
end of life
erasure
hdd
informationsecurity
method
native encryption
privacy
solid state drive
ssd
storage devices
study
tech industry analysis
university research
Phil Muncaster, V3.co.uk , Tuesday 14 December 2010 at 12:08:00 Panda Security announces its predictions for the coming year Threats targeting Windows 7, Mac and HTML5 are likely to keep information security professionals busy in 2011, with hactivism and state-sponsored attacks also set to...
An unknown number of Link Removed after authorities discovered that hackers broke into one of the company's business partner's databases and stole information.
Computerworld quotes a McDonald's spokeswoman as saying:
We have been informed by one of our long-time business partners, Arc...
access denied
arc worldwide
customer data
cybersecurity
data breach
data security
data theft
database
email company
hackers
incident
informationsecurity
mcdonald's
privacy
promotion
security
third party
Link Removed due to 404 ErrorOK, fine, "hostage" may be a bit of hyperbole.
However, right at this moment, Bank of America is presenting me with a take-it-or-leave-it proposition: Agree to our "Electronic Communications Disclosure" - all 2,127 words; three densely packed printed pages - or...
account management
agreement
bank of america
banking issues
communication preferences
consumer rights
customer experience
customer service
digital communication
digital delivery
ecommunications
financial agreements
financial services
informationsecurity
legal terms
online banking
privacy
user consent
withdrawal of consent
Windows Files: Search, Indexing and Online Backup
Windows Libraries and the Windows Search Index
In this video, I will discuss with you:
The power of the Library feature in Windows 7.
The configuration of Indexing Options.
And the ability to backup your files at any time, on the the Amazon...
Revision Note: V1.0 (August 23, 2010) Advisory published. Advisory Summary:Microsoft is aware that research has been published detailing a remote attack vector for a class of vulnerabilities that affects how applications load external libraries.
Link Removed due to 404 Error
By now everyone has heard about the alleged secret agents arrested in the USA. If you haven't had a chance to read the criminal complaint against them, you're missing out on some interesting revelations.
Revelation 1: Mission Completely Possible
Unlike James Bond (or, heck. Austin Powers)...
communication
cybersecurity
data exchange
digital communication
espionage
fbi
help desk
informationsecurity
intelligence
legal complaint
lie
military secrets
russian consulate
secret agents
spies
spy software
steganography
surveillance
tech support
wireless lan
Microsoft’s plan to “sandbox†Office documents in the next version of its application suite is an admission that the company cannot keep hackers from exploiting file format bugs, a security analyst said on July 23. “What’s been happening is that Office has lots of...