Data Protection

Data protection news, software and solutions, and analysis for IT professionals
  • 'Tragically comedic' flaw gives anyone root access to 900,000 Internet servers

    Posted June 12, 2012 - 2:13 pm

    It only happens about once every 256 times, and doesn't affect all the millions of MySQL and MariaDB databases that are among the most common apps on the web. 879,000 servers will let anyone log in who has a legitimate username and any password at all. 'Root' works great!
  • Expert calls LinkedIn's new salted hashes useless

    Posted June 11, 2012 - 5:11 pm

    Security researcher Thomas Ptacek didn't slam LinkedIn for not salting the hashes it used to protect passwords. He slammed it for using the wrong kind of encryption, and for not knowing the difference.
  • Generate and keep really secure passwords for free

    Posted June 8, 2012 - 5:27 pm

    The best way to keep from allowing a data breach at LinkedIn or another breached site from being a disaster for you is to use a different password at each. Secure passwords are impossible to remember, however, so storing them in a free password vault is the only solution.
  • Dull-looking email from printer hides sophisticated malware

    Posted June 8, 2012 - 1:33 pm

    The more interesting a phishing email is the more end users will think about them and the more likely they are to become suspicious. A burst of spam from Russian malware servers disguises itself as the automated delivery of a scan, from a printer, not a person.
  • How many seconds would it take to break your password?

    Posted June 7, 2012 - 8:00 pm

    Want to know how strong your password is? Count the number of characters and the type and calculate it yourself. Or check this list and see how big a difference between a few billion possible combinations a few sextillion possibilities really is.
  • How to determine if your LinkedIn password has been compromised

    Posted June 7, 2012 - 2:26 pm

    As reports have swirled throughout the day that approximately 6.5 million LinkedIn passwords have been leaked, security experts have been trying to figure out what happened, as well as checking to see if their own passwords have been compromised.
  • FAQ: LinkedIn breach: What members (and others) need to know

    Posted June 7, 2012 - 2:05 pm

    Here's some information on the apparent major LinkedIn breach for members of the social network, and for all Internet users.
  • LinkedIn password cracker posted 8 million logins as cry for help

    Posted June 7, 2012 - 12:19 pm

    We've finally found a reason beyond simple profit that hackers post the private information (including logins) of consumers they don't know: to get help cracking the encryption on the passwords they've already stolen.
  • FBI, RIAA boost content pirates with moves intended to punish them

    Posted June 7, 2012 - 11:49 am

    Copyright enforcers keep contradicting themselves and each other with arguments defending their own behavior or sanctions that could actually benefit those they hope to punish. Foggy rules on what 'theft' is complicate things, but the real culprit is failure to substantiate.
  • White Paper

    Backup and Recovery Performance and Best Practices for Exadata Cell and the Sun Oracle Database Machine

    Posted June 6, 2012 - 4:30 pm

    The Sun Oracle Database Machine is an easy to deploy, out-of-the-box solution for hosting the oracle Database and delivers the highest levels of performance available. It is a "grid in a box" that is composed of database servers running Oracle Database, Sun Oracle Exadata Storage Servers (Exadata), an InfiniBand fabric for storage networking, and all the other components required to host an Oracle Database. Exadata delivers outstanding I/O and SQL processing performance for online transaction processing (OLTP), data warehousing (DW), and consolidation of mixed workloads. One of the key operational aspects of deploying a Sun Oracle Database Machine is to ensure that database backups are performed and restoration of the Oracle Database is possible if disaster strikes. This paper describes the best practices for setting up the optimal backup and recovery strategy to protect your mission-critical data.
  • White Paper

    Deploy and Manage Storage with Ease with NetApp FAS2240

    Posted June 6, 2012 - 4:30 pm

    This ESG Lab Validation Report presents the hands-on evaluation and testing results of the FAS2240, NetApp's newly released entry-level storage system.
  • Change your LinkedIn password right now

    Posted June 6, 2012 - 12:11 pm

    Login data for as many as 6.5 million LinkedIn users has been posted on a Russian hacker site. LinkedIn hasn't confirmed the breach, but Tweets confirm many real passwords are on the list. Change your password. Get a password vault. Use different passwords for important sites.
  • Facebook crushes hopes of critics

    Posted June 5, 2012 - 4:46 pm

    After weeks of stone-throwing over the questionable management, intentions, privacy violations and ultimate ickiness of Facebook, critics continue to work their arms, using ammo that keeps getting more and more insubstantial.
  • Cybercrime isn't where or who you think it is

    Posted June 5, 2012 - 2:40 pm

    The US and China are the most frequent victims of cybercrime, but also house the most frequent perpetrators as well. Yes, there's lots of cybercrime in Eastern Europe, and even a cybercrime-to-cybercrime market in Russia. But the story doesn't stop there.
  • White Paper

    SMB Disaster Prepardness Survey

    Posted June 5, 2012 - 10:45 am

    SMB Disaster Prepardness Survey which measured the attitudes and practices of small- and mid-sized businesses (SMBs) and their customers toward disaster preparedness. The survey findings show that though SMBs are at risk, they are still not making disaster preparedness a priority until they experience a disaster or data loss. The data also reveals that the cost of not being prepared is high, putting an SMB at risk of going out of business. According to the survey, downtime not only costs SMBs several thousands of dollars, it also causes their customers to leave.
  • White Paper

    When Good Backups Go Bad: Data Recovery Failures and What to Do

    Posted June 5, 2012 - 10:45 am

  • Data Protection Officer role will be key if you operate in the E.U.

    Posted June 4, 2012 - 3:05 pm

    The European Union is considering sweeping new data protection laws that would mandate many organizations in Europe formally appoint a Data Protection Officer (DPO). To get ahead of the potential high demand for qualified candidates, organizations should consider defining their needs now.
  • 'Legitimate' cyberwar to make culture wars uglier

    Posted June 1, 2012 - 9:28 pm

    The admission that the US was behind cyberattacks on Iran legitimizes cyberwar for enemies of the US as well as its friends. More seriously, it makes an arsenal of semi-violent responses available to culture warriors who aren't satisfied with simply shouting at those who disagree.
  • U.S. admits cyberattacks on Iran, others

    Posted June 1, 2012 - 8:49 pm

    U.S. officials finally acknowledged a years-long cyberwar campaign against Iran and other countries according to the NYT. The admission is no surprise, but hearing cyberwar is a real option (and a real risk) gives hackers an overt place on the global stage for the first time.
  • Undergrad suspected in massive Univ. of Nebraska breach

    Posted May 31, 2012 - 9:11 pm

    Officials at the University of Nebraska in Lincoln have identified an undergraduate student they say is responsible for an intrusion into a university database containing personal data on more than 650,000 students, parents and employees.
  • Gartner: Bosses will spy on workers without demanding Facebook passwords

    Posted May 31, 2012 - 9:46 am

    Gartner published a report this week that looks like a warning that employers are too smart to continue demanding Facebook passwords. Instead they'll spy directly by searching social networks for employees' activity; Gartner's warning is a guide to how to do that legally.
  • Top malware threats: Not Flame

    Posted May 30, 2012 - 6:42 pm

    Flame, Stuxnet and Duqu get a lot of press and attract a lot of attention, but malware threats from the Android store, social networks and other transmission vectors are more dangerous to most of us. Narrow down your worries with this short list of the top 4 malware risks.
  • What would a post-e-mail world look like?

    Posted May 29, 2012 - 11:39 am

    E-mail may be on the decline, but its archival abilities can't be matched by any current contender.
  • Gartner: Don't trust cloud provider to protect your corporate assets

    Posted May 27, 2012 - 7:03 am

    When a family with a baby buys a new car, they don't buy a car seat from the vehicle manufacturer: There is specialized equipment to handle the family's most sensitive asset. John Pescatore, a Gartner vice president and security analyst, says cloud security can be thought of in a similar way: Users shouldn't rely on their cloud service provider's security features to protect their most critical data.
  • White Paper

    vRanger Helps Cut Replication Time by Almost 70%

    Posted May 25, 2012 - 9:45 am

    There's a reason why more than 38,000 customers trust vRanger to protect their critical virtual data! In this Quest Software case study, see how vRanger helped Cornerstone Bancshares, Inc. cut replication time from days to minutes - and how this translated to real time and money savings.
Join us:






Join today!

See more content
Ask a Question