Remove 10
Remove 2010 Remove Document Remove Government Remove Presentation Remove Security
article thumbnail

Russian Cybersecurity Executive Arrested for Alleged Role in 2012 Megahacks

Krebs on Security

Nikita Kislitsin , formerly the head of network security for one of Russia’s top cybersecurity firms, was arrested last week in Kazakhstan in response to 10-year-old hacking charges from the U.S. Nikita Kislitsin, at a security conference in Russia. Department of Justice.

article thumbnail

Feds Allege Adconion Employees Hijacked IP Addresses for Spamming

Krebs on Security

A statement of facts filed by the government indicates Petr Pacas was at one point director of operations at Company A (Adconion). The government alleges the men sent forged letters to an Internet hosting firm claiming they had been authorized by the registrants of the inactive IP addresses to use that space for their own purposes.

Marketing 202
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MartyMcFly Malware: new Cyber-Espionage Campaign targeting Italian Naval Industry

Security Affairs

Yoroi security firm uncovered a targeted attack against one of the most important companies in the Italian Naval Industry leveraging MartyMcFly Malware. The victim was one of the most important leaders in the field of security and defensive military grade Naval ecosystem in Italy. Opening up The Excel File it gets infected.

article thumbnail

GE's Enterprise Collaboration Backbone | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. I was able to see Dr Sukh Grewal, Manager of GE’s ‘SupportCentral‘ collaboration and workflow environment, present a succinct overview of this ecosystem at [.] Hot Topics iPhone iPad Enterprise 2.0

Paper 88
article thumbnail

Humanitarian Collaboration | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. repyke 08/10/2008 06:12 PM Reply to Flag RE: Humanitarian Collaboration This is a good example of how Technology will, by opening up opportunities for people all over the world, change peoples lives.for the better.

article thumbnail

Records Inventory 101:

ARMA International

It is a list of each series or system rather than a list of each document or folder. An inventory of an agency’s documents is required as part of a successful records management program, as is the identification of present retention schedules or the design of new retention schedules for those records.

article thumbnail

Enterprise 2.0 Conference notebook | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Security people stars of the show, Powerpoint low point Monday’s in depth session on ‘threat and vulnerability management in the Enterprise 2.0 he provided great insight into the realities of the security world.

Paper 40