The Computer security Portal
is anything that has to do with protecting computer systems
such as smartphones
, desktop computers
, company servers
, IP phones
, set-top boxes
, etc. from spam
, trojan horses
and intrusion. It is defined as methods and technologies for deterrence, protection, detection, response, recovery and extended functionality in information systems
The jdbgmgr.exe virus hoax involved an e-mail spam in 2002 that advised computer users to delete a file named jdbgmgr.exe because it was a computer virus. jdbgmgr.exe, which had a little teddy bear-like icon (The Microsoft Bear), was actually a valid Microsoft Windows file, the Debugger Registrar for Java (also known as Java Debug Manager, hence jdbgmgr).
Featuring so odd an icon among normally dull system icons had an unexpected counterpoint: an email hoax warning users that this is a virus that somehow came into your computer and should be deleted. This hoax has taken many forms and is always very popular among non-expert users that find this icon suspicious.
The email has taken many forms, including saying its purpose was to warn Hotmail users of a virus spreading via MSN Messenger, or even to alert about a possible virus in the orkut web community. All say that it was not detected by McAfee or Norton AntiVirus, which is obviously true.
This email in fact could be considered some kind of virus as it has all the normal life cycle of computer virus: It comes through user mailboxes, harm the system (by deleting a file) and then the message is forwarded to multiple recipients to reinfect them. Only that all those commands are executed by the user himself, making it a failproof virus (c.f. honor system virus).
Bruce Schneier (born January 15, 1963, pronounced "shn-EYE-er") is an American cryptographer, computer security specialist, and writer. He is the author of several books on computer security and cryptography, and is the founder and chief technology officer of BT Counterpane, formerly Counterpane Internet Security, Inc.
Schneier's Applied Cryptography is a popular reference work for cryptography. Schneier has designed or co-designed several cryptographic algorithms, including the Blowfish, Twofish and MacGuffin block ciphers, the Helix and Phelix stream ciphers, and the Yarrow and Fortuna cryptographically secure pseudo-random number generators. Solitaire is a cryptographic algorithm developed by Schneier for use by people without access to a computer, called Pontifex in Neal Stephenson's novel Cryptonomicon. In October 2008, Schneier, together with seven others, introduced the Skein hash function family, a more secure and efficient alternative to older algorithms. 
Wed, 27 May 2015 12:35:42 -0700
Government monitors repeatedly warned of IRS computer security risks long before Tuesday's disclosure that identity thieves had stolen tax agency data for roughly 100,000 U.S. households. At least seven federal audits and other reports from 2007 to ...
Business Insider Australia
Business Insider Australia
Wed, 27 May 2015 11:45:00 -0700
Mary Meeker believes that computer security threats are increasing, and that companies need to focus and deal with breaches more intelligently. Today, the long time Internet analyst, now with VC firm Kleiner Perkins Caufield & Byers, delivered her ...
Wall Street Journal
Wall Street Journal
Tue, 19 May 2015 16:03:15 -0700
NSA didn't respond to a request for comment. The bugs and the efforts to fix them highlight key weaknesses in computer security. Researchers say the Internet is vulnerable in part because it is so decentralized and has been built piecemeal, from ...
Sun, 17 May 2015 15:55:13 -0700
A computer security expert told the FBI that he hacked into an airplane's computer and briefly took over control of the engines, court documents reveal. Chris Roberts, chief technology officer and founder of One World Labs, told FBI agents he connected ...
Wed, 20 May 2015 22:26:15 -0700
The U.S. Commerce Department has proposed tighter export rules for computer security tools, a potentially controversial revision to an international agreement aimed at controlling weapons technology. On Wednesday, the department published a proposal in ...
Sun, 03 May 2015 01:00:16 -0700
The FBI wants us to have computer security so strong that only they can break in… US intelligence agencies have no objection to us encrypting messages – as long as they can still read them. James Comey. Tales from the encrypt: according to FBI ...
Wed, 27 May 2015 16:37:30 -0700
A firestorm has erupted in the computer security community represented by the twitter hashtag #wassenaar. That hashtag refers to the international arms treaty known as the Wassenaar Arrangement, named for the European town where it was first signed in ...
Wed, 13 May 2015 05:00:36 -0700
This morning a computer security researcher revealed his discovery of a new, severe software vulnerability that potentially impacts millions of businesses; business owners and IT departments need to be aware of the relevant issue and take action to ...
Oops, we seem to be having trouble contacting Twitter
Digplanet also receives support from Searchlight Group.