The Computer security Portal
is anything that has to do with protecting computer systems
such as smartphones
, desktop computers
, company servers
, IP phones
, set-top boxes
, etc. from spam
, trojan horses
and intrusion. It is defined as methods and technologies for deterrence, protection, detection, response, recovery and extended functionality in information systems
The jdbgmgr.exe virus hoax involved an e-mail spam in 2002 that advised computer users to delete a file named jdbgmgr.exe because it was a computer virus. jdbgmgr.exe, which had a little teddy bear-like icon (The Microsoft Bear), was actually a valid Microsoft Windows file, the Debugger Registrar for Java (also known as Java Debug Manager, hence jdbgmgr).
Featuring so odd an icon among normally dull system icons had an unexpected counterpoint: an email hoax warning users that this is a virus that somehow came into your computer and should be deleted. This hoax has taken many forms and is always very popular among non-expert users that find this icon suspicious.
The email has taken many forms, including saying its purpose was to warn Hotmail users of a virus spreading via MSN Messenger, or even to alert about a possible virus in the orkut web community. All say that it was not detected by McAfee or Norton AntiVirus, which is obviously true.
This email in fact could be considered some kind of virus as it has all the normal life cycle of computer virus: It comes through user mailboxes, harm the system (by deleting a file) and then the message is forwarded to multiple recipients to reinfect them. Only that all those commands are executed by the user himself, making it a failproof virus (c.f. honor system virus).
Bruce Schneier (born January 15, 1963, pronounced "shn-EYE-er") is an American cryptographer, computer security specialist, and writer. He is the author of several books on computer security and cryptography, and is the founder and chief technology officer of BT Counterpane, formerly Counterpane Internet Security, Inc.
Schneier's Applied Cryptography is a popular reference work for cryptography. Schneier has designed or co-designed several cryptographic algorithms, including the Blowfish, Twofish and MacGuffin block ciphers, the Helix and Phelix stream ciphers, and the Yarrow and Fortuna cryptographically secure pseudo-random number generators. Solitaire is a cryptographic algorithm developed by Schneier for use by people without access to a computer, called Pontifex in Neal Stephenson's novel Cryptonomicon. In October 2008, Schneier, together with seven others, introduced the Skein hash function family, a more secure and efficient alternative to older algorithms. 
Introduction to Computer Security - Information Security Lesson #1 of 12
Dr. Soper provides an introduction to computer security. Topics covered include dependence on technology, information assets, threats, vulnerabilities, controls, confidentiality, integrity,...
Computer Security Basics
Info: Level: Beginner Presenter: Eli the Computer Guy Length: 30 Minutes Tracks: Security / Data Integrity Prerequisites: None Purpose of Class: This class introduces you to the basic concepts...
TEDxMidAtlantic 2011 - Avi Rubin - All Your Devices Can Be Hacked
Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi's primary research area is Computer Security, and...
10 Cyber Security Facts - WMNews Ep. 4
With recent high-profile and widespread computer viruses making headlines, it's become obvious that the future is now. Welcome to WatchMojo News, the weekly series from http://www.WatchMojo.com.
Question: Should I Get a Masters Degree in Computer Engineering or Cyber Security?
First of all I would like to say that I admire your work on youtube and many times your videos helped a lot to go through my university's projects. I'm currently doing my final year Computer...
Lecture 6 Security - Understanding Computers and the Internet.
Lecture by Dan Armendariz and David J. Malan of Harvard University. This course is all about understanding: understanding what's going on inside your computer when you flip on the switch, why...
There's a lot you can do to protect yourself and your computer from scammers, hackers, and identity thieves. Start by keeping your computer software up-to-date. Comment Moderation Policy:...
Computer Security Basic Principles
Introduction to four of the principles of Computer Security: Integrity, Confidentiality, Availability and Non-repudiation.
The Internet is fundamentally insecure. However, there are simple things you can do to protect yourself and your information. Learn what they are in NOVA's Cybersecurity Lab. Play the Cybersecur...
Tue, 21 Apr 2015 15:15:51 -0700
SAN FRANCISCO – Computer security has failed to protect us, the head of RSA Security said at the start of the world's biggest computer security conference Tuesday. Amit Yoran took on the position of president at Bedford, Mass.-based RSA seven months ...
Wall Street Journal
Wall Street Journal
Mon, 20 Apr 2015 16:41:40 -0700
Nearly 500 companies will gather in San Francisco this week, seeking a piece of the $80 billion industry that tries to keep bad people out of good people's computers. But the guy at the front of the RSA Conference, the computer security industry's ...
New York Times (blog)
New York Times (blog)
Wed, 22 Apr 2015 11:33:14 -0700
SAN FRANCISCO — The annual RSA security conference here is one of the largest gatherings of computer security professionals and companies in the world. It is also an opportunity for complaining and perhaps just a bit of navel gazing. Where is the ...
Sun, 19 Apr 2015 13:28:12 -0700
SAN FRANCISCO — A computer security researcher on his way to give a talk about computer security vulnerabilities at a major conference was told he couldn't fly on United Airlines Saturday, due to comments he'd made on Twitter. Chris Roberts, of One ...
New York Times
Wed, 22 Apr 2015 02:00:34 -0700
WASHINGTON — Responding to a series of computer security breaches in government and the private sector, the House passed an expansive measure Wednesday that would push companies to share access to their computer networks and records with ...
Fri, 24 Apr 2015 05:33:45 -0700
Grassley cited numerous audits from the Government Accountability Office that cite computer security weaknesses at the IRS, as well as the Treasury Inspector General for Tax Administration's finding of "Security for Taxpayer Data and IRS Employees" as ...
Fri, 17 Apr 2015 15:34:50 -0700
Chris Roberts' United flight didn't go so smoothly. Doc7austin/YouTube; screenshot by Chris Matyszczyk/CNET. Computer security experts tend to be suspicious souls. Sometimes, though, others become suspicious of them. Chris Roberts, a Colorado-based ...
Silicon Valley Business Journal
Silicon Valley Business Journal
Tue, 21 Apr 2015 06:25:18 -0700
The dearth of women and minorities in computer security came into sharper focus at the RSA security conference in San Francisco with a workforce study that showed the industry lagging even the paltry numbers at Silicon Valley's larger technology ...
Oops, we seem to be having trouble contacting Twitter
Digplanet also receives support from Searchlight Group.