*Parallelized* Data Mining (PDM) Security

Parallel Data Mining is currently attracting much research. Objects involved with ‘Parallel Data Mining’ include special type of entities with the ability to migrate from one processor to another where it can resume / initiate its execution. In this article we consider security issues that need to be addressed before these systems in general, and […]

ENISA’s Cloud Computing Risk Summary

ENISA’s report on Cloud Security identified number of places where risk elements were identified viz. the report acknowledged 8 high risk items & 29 medium risk items in the varied areas of Policies & Organizational Risks, Technical Risks, Legal Risks, and Cloud Unspecific Risks. In summary, the identified elements labeled as *key risk’s* are briefed below: (1) Loss Of […]

Online Safety: Things to Do & Things to Avoid

Either it is a battlefield or a football field, there are always certain safety tips given to people before going anywhere, & it is recommended to follow them all. In the same way, for your Online Safety, there are things that you should know before you go Online Things to do: Use a combination of […]

Microsoft’s released six security updates

Microsoft’s released six security updates and re-released one for this month. • MS07-055 – addresses a vulnerability in Windows (KB 923810) Vulnerability in Kodak Image Viewer Could Allow Remote Code Execution Severity Rating: Critical MS07-056 – addresses a vulnerability in Windows (KB 941202) Security Update for Outlook Express and Windows Mail Severity Rating: Critical • […]

The Ghost In The Browser

Today I found an interesting link on the Analysis of Web-based Malware produced by Google to present the state of malware on the Web and emphasize the importance of this rising threat. This whitepaper is really awesome where they discussed different mechanisms used to inject malicious content on popular web sites: web server security, user […]