Search Results for: ULA

Copenhagen could turn tide on public opinion

As the United Nations Climate Change Conference (COP15) wraps up in Copenhagen this week, hopes are high among the environmental community for a myriad of accomplishments to come out of the two-week-long talks. The most important outcome might be a chance to turn the tide on a strategic mistake in …

Read More »

2009: The Year of Cyber Crime

This past year the number of cyber attacks, cyber security breaches and internet related crime has risen steadily making e-consumers think twice about online purchases. According to Symantec in a recent study, 87% of e-mails received in the last year were spam. That number is up ten percent since 2008. …

Read More »

Healthy Holiday Hints

As executives and their families embrace the brief lull from work to join the excitement of preparing for beloved holiday activities, it’s important to remember the small precautions to protect your loved ones. For example, many families decorate with lush greenery to set a festive tableau for the season.  Although …

Read More »

Cloud Computing used to crack passwords

In the latest demonstration of the different capabilities of cloud computing, a service known as WPA Cracker, which uses cloud services, was released last week according to an article on Technology Review. For a small fee of $34, you can use the service to break a WiFi Protected Access (WPA) …

Read More »

Germans Set Up Botnet Cleaner

The German Federal Office for Information Security, along with German ISPs, are setting up a service to clean up infected computers that are used in botnets. The ISPs will track down infected computers and notify the users by directing them to a website with helpful information and the telephone number …

Read More »

House Passes Data Breach Notification Bill

The House has passed a bill that would introduce national rules surrounding the need to notify potential victims of identity theft following data breaches. According to the bill, companies that possess personal data will be required to notify any U.S. citizens and residents along with the FTC if a data …

Read More »

Top Internet Threats for 2009

CA, Inc. recently released its report on the State of the Internet 2009, which profiles some of the top threats on the internet for 2009. Some of the top threats include fake security software, social networking and Web 2.0 technologies. The report also looks towards the coming year, predicting that …

Read More »

White House Announces Open Government Directive

On Tuesday, December 8th, 2009 Federal Chief Technology Officer, Aneesh Chopra, and Federal Chief Information Officer, Vivek Kundra, announced the arrival of the Open Government Directive. This was done as a live web chat at 11:00 am Eastern time that was open public. At the end of the announcement, they …

Read More »

Cyber Pearl Harbor: Is it Possible?

Today is the anniversary of the Japanese attack on Pearl Harbor in 1941. On Dec. 7, a Japanese carrier fleet launched a series of air attacks on the U.S. Naval base at Pearl Harbor, sinking several ships and destroying a number of aircraft. A number of leading thinkers in cybersecurity …

Read More »

Just Breathe…

Breathing for life is a given – yet the vast majority of busy executives may not breathe properly.  A lack of exercise and poor or stiff posture caused by long hours slumped over a computer can cause a constriction of the chest and lungs. Over time, shallow chest breathing leads …

Read More »