The Computer security Portal
is anything that has to do with protecting computer systems
such as smartphones
, desktop computers
, company servers
, IP phones
, set-top boxes
, etc. from spam
, trojan horses
and intrusion. It is defined as methods and technologies for deterrence, protection, detection, response, recovery and extended functionality in information systems
The jdbgmgr.exe virus hoax involved an e-mail spam in 2002 that advised computer users to delete a file named jdbgmgr.exe because it was a computer virus. jdbgmgr.exe, which had a little teddy bear-like icon (The Microsoft Bear), was actually a valid Microsoft Windows file, the Debugger Registrar for Java (also known as Java Debug Manager, hence jdbgmgr).
Featuring so odd an icon among normally dull system icons had an unexpected counterpoint: an email hoax warning users that this is a virus that somehow came into your computer and should be deleted. This hoax has taken many forms and is always very popular among non-expert users that find this icon suspicious.
The email has taken many forms, including saying its purpose was to warn Hotmail users of a virus spreading via MSN Messenger, or even to alert about a possible virus in the orkut web community. All say that it was not detected by McAfee or Norton AntiVirus, which is obviously true.
This email in fact could be considered some kind of virus as it has all the normal life cycle of computer virus: It comes through user mailboxes, harm the system (by deleting a file) and then the message is forwarded to multiple recipients to reinfect them. Only that all those commands are executed by the user himself, making it a failproof virus (c.f. honor system virus).
Bruce Schneier (born January 15, 1963, pronounced "shn-EYE-er") is an American cryptographer, computer security specialist, and writer. He is the author of several books on computer security and cryptography, and is the founder and chief technology officer of BT Counterpane, formerly Counterpane Internet Security, Inc.
Schneier's Applied Cryptography is a popular reference work for cryptography. Schneier has designed or co-designed several cryptographic algorithms, including the Blowfish, Twofish and MacGuffin block ciphers, the Helix and Phelix stream ciphers, and the Yarrow and Fortuna cryptographically secure pseudo-random number generators. Solitaire is a cryptographic algorithm developed by Schneier for use by people without access to a computer, called Pontifex in Neal Stephenson's novel Cryptonomicon. In October 2008, Schneier, together with seven others, introduced the Skein hash function family, a more secure and efficient alternative to older algorithms. 
Introduction to Computer Security - Information Security Lesson #1 of 12
Dr. Soper provides an introduction to computer security. Topics covered include dependence on technology, information assets, threats, vulnerabilities, controls, confidentiality, integrity,...
TEDxMidAtlantic 2011 - Avi Rubin - All Your Devices Can Be Hacked
Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi's primary research area is Computer Security, and...
10 Cyber Security Facts - WMNews Ep. 4
With recent high-profile and widespread computer viruses making headlines, it's become obvious that the future is now. Welcome to WatchMojo News, the weekly series from http://www.WatchMojo.com.
Computer Security Basics
Info: Level: Beginner Presenter: Eli the Computer Guy Length: 30 Minutes Tracks: Security / Data Integrity Prerequisites: None Purpose of Class: This class introduces you to the basic concepts...
There's a lot you can do to protect yourself and your computer from scammers, hackers, and identity thieves. Start by keeping your computer software up-to-date. Comment Moderation Policy:...
Offensive Computer Security 2014 - Lecture 01
This lecture covers the course Intro, syllabus review, distinction between hacking vs. penetration testing, ethics discussion, course motivation, threat models and some of the basics. The...
Computer Security Basic Principles
Introduction to four of the principles of Computer Security: Integrity, Confidentiality, Availability and Non-repudiation.
The Internet is fundamentally insecure. However, there are simple things you can do to protect yourself and your information. Learn what they are in NOVA's Cybersecurity Lab. Play the Cybersecur...
Computer Security Basics
Computer Security Basics I created this video with the YouTube Video Editor (http://www.youtube.com/editor)
ShmooCon 2013: Ten Strategies of a World-Class Computer Security Incident Response Team
For more information and to download the video visit: http://bit.ly/shmoocon2013 Playlist ShmooCon 2013: http://bit.ly/Shmoo13 Speaker: Carson Zimmerman Today's Computer Security Incident...
Fri, 20 Mar 2015 09:52:30 -0700
... shows that it is possible to 'fool' a deep learning system so it learns something that is not true but that you want it to learn,” said Fred Schneider, the Samuel B. Eckert Professor of Computer Science and a nationally recognized expert on ...
Thu, 19 Mar 2015 12:33:34 -0700
IRS botches computer security, risks taxpayer info: audit. The exterior of the Internal Revenue Service building in Washington is seen here on March 22, 2013. (Associated Press) **FILE** more >. By Stephen Dinan - The Washington Times - Thursday, March ...
JD Supra (press release)
Sat, 28 Mar 2015 02:22:30 -0700
I suspect this may surprise most Delawareans. In 2005, Delaware Governor Ruth Ann Minner signed into law House Bill 116. That bill, now codified as 6 Del. C. §§ 12B-101 et seq., requires individuals or commercial entities, upon becoming aware of ...
Jewish Business News
Mon, 23 Mar 2015 04:37:51 -0700
Air-gapped systems, which are isolated from the Internet and are not connected to other systems that are connected to the Internet, are used in situations that demand high security because they make siphoning data from them difficult. Air-gapped ...
Wed, 04 Mar 2015 17:07:30 -0800
EFF has joined 26 civil society organizations and 22 computer security experts in a letter that calls on the Senate Select Committee on Intelligence to reject the Cybersecurity Information Sharing Act of 2015 (CISA). CISA, currently only available in ...
Tue, 24 Mar 2015 08:11:15 -0700
Last month, I had the awful misfortune to be attacked by a malware virus on my computer. An actual “ransom note” appeared on my laptop screen, and I was horrified. This is a thing? Someone can do this — hold my work and personal files hostage? Being ...
Tue, 24 Mar 2015 04:37:25 -0700
CYBER security firm Accumuli has been brought by rival NCC for a fee of £55m. NCC is paying 32.8p per share for Accumuli, which operates out of an office at Vision Park, Histon, as well as four other UK locations. "The addition of Accumuli will enable ...
Sat, 21 Mar 2015 19:30:12 -0700
Ambareen Siraj looks out at the 75 students in her computer security class and often sees that she's the only woman in the room. At most, one or two women sign up each semester for her information assurance and security course at Tennessee Tech ...
Oops, we seem to be having trouble contacting Twitter
Digplanet also receives support from Searchlight Group.