Youry's Blog

Youry's Blog

Archive for May 2009

IT Infrastructure Slideshow: NASA Atlantis Shuttle Takes Final Ride to Hubble Telescope

leave a comment »

IT Infrastructure Slideshow: NASA Atlantis Shuttle Takes Final Ride to Hubble Telescope
(from eWeek.com):
The 19-year-old Hubble Space Telescope is in desperate need of repair, with outdated and failing batteries, busted gyroscopes, and spotty electrical and communications systems. The Atlantis shuttle launched May 11 on its last flight with the mission of giving the Hubble a much-needed systems overhaul and installing a new, more powerful wide-field camera and the Cosmic Origins Spectrograph. The seven-man crew is expected to arrive at the Hubble May 13 and, if all goes well, Hubble’s life will be extended to at least 2014. Here’s an eWEEK day-to-day look at the first mission to Hubble since 2002.

Advertisements

Written by youryblog

May 12, 2009 at 11:16 AM

Posted in News

Missile Defense Secrets Sold on eBay By: Roy Mark 2009-05-07

leave a comment »

Missile Defense Secrets Sold on eBay By: Roy Mark 2009-05-07
Details of the Terminal High Altitude Area Defense system used to shoot down ballistic missiles using a hit-to-kill approach are found on a computer sold through eBay.

Written by youryblog

May 8, 2009 at 7:15 PM

Posted in SecurityNews

Researchers Take Over Dangerous Botnet Dark Reading (05/04/09) Higgins, Kelly Jackson

leave a comment »

Researchers Take Over Dangerous Botnet
Dark Reading (05/04/09) Higgins, Kelly Jackson

University of California-Santa Barbara (UCSB) researchers temporarily commandeered an infamous botnet known for stealing financial data and found that the threat it represents is even greater than had been originally assumed. T

Written by youryblog

May 8, 2009 at 7:11 PM

Posted in SecurityNews

How Hackers Can Steal Secrets from Reflections By W. Wayt Gibbs

leave a comment »

How Hackers Can Steal Secrets from Reflections By W. Wayt Gibbs From the May 2009 Scientific American Magazine
Information thieves can now go around encryption, networks and the operating system
Key Concepts:
* Even with the best network security, your electronic data may not be safe from a determined hacker.
* Researchers have extracted information from nothing more than the reflection of a computer monitor off an eyeball or the sounds emanating from a printer.
* These attacks are difficult to defend against and impossible to trace.

Written by youryblog

May 7, 2009 at 1:49 PM

Posted in SecurityNews

The Evolution of Phishing By: Joe Eitel 2009-05-06

leave a comment »

The Evolution of Phishing By: Joe Eitel 2009-05-06
If you are unfamiliar with the epidemic of phishing, it is high time that you educate yourself on the matter. Unfortunately, ignorance will not keep the danger of those who want your information at bay.
information from http://web.eweek.com/dm?id=8E48A490D03B0741A6A48396B383E41B

Written by youryblog

May 7, 2009 at 1:44 PM

Posted in SecurityNews

Security Researchers Uncover 70GB of Financial Data Stolen by Botnet By: Brian Prince 2009-05-04

leave a comment »

Security Researchers Uncover 70GB of Financial Data Stolen by Botnet By: Brian Prince 2009-05-04
Researchers at the University of California, Santa Barbara, say they seized control of the Torpig botnet for 10 days earlier in 2009 and uncovered 70GB worth of financial data, from credit card numbers to bank account credentials.

Written by youryblog

May 7, 2009 at 1:36 PM

Posted in SecurityNews

Data Ransom Scheme a Surprising Play for Hackers By: Brian Prince 2009-05-05

leave a comment »

Data Ransom Scheme a Surprising Play for Hackers By: Brian Prince 2009-05-05
When it comes to cyber-crime, holding data for ransom is not a common form of attack on enterprises. The recent hack of a Virginian state Website is a reminder that ransomware and other schemes can still be viable ways for cyber-crooks to try to make a dollar.

Written by youryblog

May 7, 2009 at 1:35 PM

Posted in SecurityNews