The Computer security Portal
The jdbgmgr.exe virus hoax involved an e-mail spam in 2002 that advised computer users to delete a file named jdbgmgr.exe because it was a computer virus. jdbgmgr.exe, which had a little teddy bear-like icon (The Microsoft Bear), was actually a valid Microsoft Windows file, the Debugger Registrar for Java (also known as Java Debug Manager, hence jdbgmgr).
Featuring so odd an icon among normally dull system icons had an unexpected counterpoint: an email hoax warning users that this is a virus that somehow came into your computer and should be deleted. This hoax has taken many forms and is always very popular among non-expert users that find this icon suspicious.
The email has taken many forms, including saying its purpose was to warn Hotmail users of a virus spreading via MSN Messenger, or even to alert about a possible virus in the orkut web community. All say that it was not detected by McAfee or Norton AntiVirus, which is obviously true.
This email in fact could be considered some kind of virus as it has all the normal life cycle of computer virus: It comes through user mailboxes, harm the system (by deleting a file) and then the message is forwarded to multiple recipients to reinfect them. Only that all those commands are executed by the user himself, making it a failproof virus (c.f. honor system virus).
Bruce Schneier (born January 15, 1963, pronounced "shn-EYE-er") is an American cryptographer, computer security specialist, and writer. He is the author of several books on computer security and cryptography, and is the founder and chief technology officer of BT Counterpane, formerly Counterpane Internet Security, Inc.
Schneier's Applied Cryptography is a popular reference work for cryptography. Schneier has designed or co-designed several cryptographic algorithms, including the Blowfish, Twofish and MacGuffin block ciphers, the Helix and Phelix stream ciphers, and the Yarrow and Fortuna cryptographically secure pseudo-random number generators. Solitaire is a cryptographic algorithm developed by Schneier for use by people without access to a computer, called Pontifex in Neal Stephenson's novel Cryptonomicon. In October 2008, Schneier, together with seven others, introduced the Skein hash function family, a more secure and efficient alternative to older algorithms. 
Introduction to Computer Security - Information Security Lesson #1 of 12
Dr. Soper provides an introduction to computer security. Topics covered include dependence on technology, information assets, threats, vulnerabilities, controls, ...
Question: Should I Get a Masters Degree in Computer Engineering or Cyber Security?
First of all I would like to say that I admire your work on youtube and many times your videos helped a lot to go through my university's projects. I'm currently ...
10 Cyber Security Facts - WMNews Ep. 4
With recent high-profile and widespread computer viruses making headlines, it's become obvious that the future is now. Welcome to WatchMojo News, the ...
Computer Security Basics
Info: Level: Beginner Presenter: Eli the Computer Guy Length: 30 Minutes Tracks: Security / Data Integrity Prerequisites: None Purpose of Class: This class ...
There's a lot you can do to protect yourself and your computer from scammers, hackers, and identity thieves. Start by keeping your computer software up-to-date.
Best Ways to Improve your Computer Security Online
Here are some tips and best practices for improving your computer's security both online and offline. How to make sure your accounts are safe even if someone ...
Not Even Close The State of Computer Security
n this bleak, relentlessly morbid talk, James Mickens will describe why making computers secure is an intrinsically impossible task. He will explain why no ...
Computer Security Basic Principles
Introduction to four of the principles of Computer Security: Integrity, Confidentiality, Availability and Non-repudiation.
TEDxMidAtlantic 2011 - Avi Rubin - All Your Devices Can Be Hacked
Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi's primary research ...
The Internet is fundamentally insecure. However, there are simple things you can do to protect yourself and your information. Learn what they are in NOVA's ...
Tue, 24 Nov 2015 09:03:45 -0800
PC-maker Dell is taking action to fix a security vulnerability on a number of its laptops shipped since August 2015. The flaw was found in the digital certificate, eDellRoot, installed by Dell Foundation Services, which is part of a support tool to ...
Yibada (English Edition)
Yibada (English Edition)
Thu, 26 Nov 2015 01:11:15 -0800
Dell Issues Apology Over Computer Security Hole. Marco Foronda | Nov 26, 2015 04:03 AM EST. Some of recently shipped Dell laptops have pre-installed digital certificate that may be prone to cyber-attacks. (Photo : Reuters). Dell has admitted that a ...
Mon, 23 Nov 2015 16:22:02 -0800
Computer security expert Kenn White has also demonstrated how attackers can use the flaw to impersonate seemingly sound websites. In a screenshot, he shows how he was able to establish an encrypted connection to what is apparently an HTTPS-secured ...
Wed, 11 Nov 2015 07:00:00 -0800
Any law that forbids citizens from revealing what the government gets up to, or from speaking out about what they find, needs to be looked at with a very hard stare indeed. Yet that's where we find ourselves with the draft Investigatory Powers Bill ...
Wed, 28 Oct 2015 11:59:14 -0700
The New Zealand Internet Task Force (NZITF) is seeking public funding to build a proof-of-concept Computer Security Incident Response Team, or CSIRT. The initiative aims to help defend small and medium-sized businesses and not-for-profit organisations ...
Tue, 17 Nov 2015 16:32:46 -0800
A SCOTTISH computer security group is welcoming plans by George Osborne to double the UK's budget for fighting cybercrime to almost £2 billion within the next five years. The Chancellor made his announcement yesterday at the headquarters of GCHQ in ...
Thu, 19 Nov 2015 13:46:12 -0800
... stay away from American providers of VPNs and encrypted chat tools and instead use ones like Telegram and Sicher, instant messaging apps made by companies based in Germany, or the Freedome, a VPN from the Finish computer security firm F-Secure.
Fri, 13 Nov 2015 16:14:21 -0800
Owensboro Health officials announced Friday that a breach had occurred affecting some computers at its OH Muhlenberg hospital in Greenville, and that the hospital is offering one year of complimentary identity protection services to individuals who may ...
Oops, we seem to be having trouble contacting Twitter
Digplanet also receives support from Searchlight Group.