JellyMuffin.com - The place for profile layouts, flash generators, glitter graphics, backgrounds and codes

Monday, June 23, 2008

The threat of online security: How safe is our data?

There are more and more threats in the society prosper that produce millions of high technology productions such as computer, handphone, PDA, i-pod and so on. So, there are happen a lots of cases that relevant to the threat of online security which mentioned how and where our data being stolen:



Symantec Internet Security Threat Report: Trends for July-07

The Symantec Internet Security Threat Report provides a six-month update of worldwide internet threat activity. It includes analysis of network-based attacks, a review of known vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the Internet Security Threat Report will alert readers to current trends and impending threats that Symantec has observed for the six-month period from July 1 to December 31, 2007



Protecting Agency Data from Loss or Theft- Vendor Podcast

In recent years, the US federal government has suffered a slew number of high-profile security breaches that have exposed the flaws in traditional data protection strategies. To help agencies safeguard proprietary information, the federal government has issued various requirements, including DCID 6/3 and OMB 06-16. But enforcing compliance with these and other policies requires the right tools and processes.



Tangled Web: Uncover Threats, Invisible Enemies

Long gone are the "good old bad old days" when threats generally had an instant and obvious effect - when many businesses simply warned employees not to click on dubious looking email attachments in case their computers became infected with a virus or some other unwelcome visitor. Today we are seeing a rising tide of dangers that are more cunning, harder to pin down and much more difficult to defend against.
Examining recent developments in the threat landscape, this white paper focuses on the emergence of the web and covert information-gathering as key battlegrounds in the ongoing war against malware propagators and the criminal gangs increasingly active in this field.




As we can see the cases above, i encourage the users of the media electronic production should always put more protections such as antivirus software, firewall system, password and much more to avoid hacker enter into your program.

1 comment:

Anonymous said...

I think it would be useful for you to provide the links to the cases that you have highlighted in this post for your reader's reference.