The Computer security Portal
The jdbgmgr.exe virus hoax involved an e-mail spam in 2002 that advised computer users to delete a file named jdbgmgr.exe because it was a computer virus. jdbgmgr.exe, which had a little teddy bear-like icon (The Microsoft Bear), was actually a valid Microsoft Windows file, the Debugger Registrar for Java (also known as Java Debug Manager, hence jdbgmgr).
Featuring so odd an icon among normally dull system icons had an unexpected counterpoint: an email hoax warning users that this is a virus that somehow came into your computer and should be deleted. This hoax has taken many forms and is always very popular among non-expert users that find this icon suspicious.
The email has taken many forms, including saying its purpose was to warn Hotmail users of a virus spreading via MSN Messenger, or even to alert about a possible virus in the orkut web community. All say that it was not detected by McAfee or Norton AntiVirus, which is obviously true.
This email in fact could be considered some kind of virus as it has all the normal life cycle of computer virus: It comes through user mailboxes, harm the system (by deleting a file) and then the message is forwarded to multiple recipients to reinfect them. Only that all those commands are executed by the user himself, making it a failproof virus (c.f. honor system virus).
Bruce Schneier (born January 15, 1963, pronounced "shn-EYE-er") is an American cryptographer, computer security specialist, and writer. He is the author of several books on computer security and cryptography, and is the founder and chief technology officer of BT Counterpane, formerly Counterpane Internet Security, Inc.
Schneier's Applied Cryptography is a popular reference work for cryptography. Schneier has designed or co-designed several cryptographic algorithms, including the Blowfish, Twofish and MacGuffin block ciphers, the Helix and Phelix stream ciphers, and the Yarrow and Fortuna cryptographically secure pseudo-random number generators. Solitaire is a cryptographic algorithm developed by Schneier for use by people without access to a computer, called Pontifex in Neal Stephenson's novel Cryptonomicon. In October 2008, Schneier, together with seven others, introduced the Skein hash function family, a more secure and efficient alternative to older algorithms. 
Introduction to Computer Security - Information Security Lesson #1 of 12
Dr. Soper provides an introduction to computer security. Topics covered include dependence on technology, information assets, threats, vulnerabilities, controls, ...
Computer Security Basics
Info: Level: Beginner Presenter: Eli the Computer Guy Length: 30 Minutes Tracks: Security / Data Integrity Prerequisites: None Purpose of Class: This class ...
10 Cyber Security Facts - WMNews Ep. 4
With recent high-profile and widespread computer viruses making headlines, it's become obvious that the future is now. Welcome to WatchMojo News, the ...
There's a lot you can do to protect yourself and your computer from scammers, hackers, and identity thieves. Start by keeping your computer software up-to-date.
Best Ways to Improve your Computer Security Online
Here are some tips and best practices for improving your computer's security both online and offline. How to make sure your accounts are safe even if someone ...
Question: Should I Get a Masters Degree in Computer Engineering or Cyber Security?
First of all I would like to say that I admire your work on youtube and many times your videos helped a lot to go through my university's projects. I'm currently ...
Not Even Close The State of Computer Security
n this bleak, relentlessly morbid talk, James Mickens will describe why making computers secure is an intrinsically impossible task. He will explain why no ...
Computer Security Basic Principles
Introduction to four of the principles of Computer Security: Integrity, Confidentiality, Availability and Non-repudiation.
The Internet is fundamentally insecure. However, there are simple things you can do to protect yourself and your information. Learn what they are in NOVA's ...
Top hacker shows us how it's done | Pablos Holman | TEDxMidwest
Never miss a talk! SUBSCRIBE to the TEDx channel: http://bit.ly/1FAg8hB You think your wireless and other technology is safe? From Blue Tooth to automobile ...
Graham Cluley Security News
Graham Cluley Security News
Tue, 09 Feb 2016 02:45:40 -0800
you may still want to check out who has made the shortlist because there are some great blogs out there tackling computer security and privacy. Certainly when I made my way down the list I saw that there were a couple that I had never heard of before ...
Slate Magazine (blog)
Slate Magazine (blog)
Fri, 22 Jan 2016 06:40:40 -0800
The idea that humans are the “weakest link” in computer security is very popular among computer scientists and people who work on the technical elements of cybersecurity. After all, if your job is to secure computer systems, it's satisfying to feel ...
Thu, 04 Feb 2016 12:22:56 -0800
Barstow, MD -- It's like a burglar stalking their prey, going door to turn until one door is unlocked and offers easy pickings. That's an apt description of what hackers do – looking for an opening in your computer's security. Rick Zeeger (shown) has ...
Fri, 29 Jan 2016 11:52:30 -0800
I have been working in computer security for over 25 years and over that time I hear two extremes in the responses to computer security: people believe it won't happen to them and do very little to protect themselves or they are so afraid they limit ...
Fri, 15 Jan 2016 07:01:19 -0800
With help from Joseph Marks and David Perera. IF YOU CAN MAKE IT THERE — A state legislator in New York has introduced a bill that would make encrypted smartphones illegal in the Empire State -- unless police are able to decode their contents. So far ...
Tue, 09 Feb 2016 02:00:40 -0800
White House officials said the new federal CISO exclusively will be in charge of making sure government workers do basic things to improve computer security. So-called “cyber hygiene” includes decidedly unsexy things like making sure agencies patch ...
Hood County News
Sat, 06 Feb 2016 23:15:18 -0800
Andrew Mithcell McKinzie, 38, of the 800 block of Blue Quail Court in the Quail Ridge Acres subdivision, was arrested Feb. 5 and charged with a felony count of breach of computer security, Sheriff's Lieutenant Johnny Rose said. The charge stems from ...
Mon, 08 Feb 2016 20:01:39 -0800
“When it comes to individuals connecting via e-mail, social media or other messaging, we are in the world of the Venetian masked ball.” Such is the half-anonymous, crime-ridden world of the Internet that Edward Lucas confronts and untangles in his new ...
Oops, we seem to be having trouble contacting Twitter
Digplanet also receives support from Searchlight Group.