Security

RSS
Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.
  • Slashed budgets? Think strategic, not tactical

    Posted February 19, 2009 - 4:00 pm

    In the current economic climate of uncertainty and tight IT budgets, often the mistake is to assume a more tactical, rather than strategic, approach to securing the ever-increasing volume of data travelling through an organization, said an information security expert.
  • The Ultimate Browser Security Face-Off

    Posted February 19, 2009 - 3:38 pm

    We drilled deep into the security workings of the five most popular browsers: Internet Explorer, Firefox, Opera, Safari, and Chrome. Every control, checkbox, and slider was poked and prodded, as we browsed the most infected sites on the Web.
  • Researchers detail Intel TXT hacks at Black Hat

    Posted February 19, 2009 - 12:25 pm

    Two security researchers fleshed out details Wednesday at the Black Hat conference in Washington of a method they disclosed earlier this year for circumventing Intel Corp.'s new Trusted Execution Technology (TXT) security software.
  • Cloud security fears are overblown, some say

    Posted February 19, 2009 - 10:33 am

    It may sound like heresy to say it, but it's possible to worry a little too much about security in cloud computing environments, speakers at IDC's Cloud Computing Forum said on Wednesday.
  • Lost Laptops Come Home in New Ways

    Posted February 18, 2009 - 11:31 pm

    Absolute.com has added new services to help get your lost or stolen laptops back. Plus, two other tracking services you may not know of have added new services as well.
  • Bot busts newest Hotmail CAPTCHA

    Posted February 18, 2009 - 5:36 pm

    Spammers have cracked Microsoft's latest defense against abuse of its Live Hotmail e-mail service using a sophisticated network of hacked computers that receive encrypted instructions from a central server, a security company has reported.
  • Miley Cyrus hit by Twitter hack

    Posted February 18, 2009 - 12:38 pm

    Following the news that hackers took control of Twitter accounts belonging to a number of celebrities including Barack Obama and Britney Spears, security firm Sophos has revealed that Miley Cyrus is the latest celebrity to have her account with the micro-blogging service compromised.Miley Cyrus hit by Twitter hack
  • Accused rogue admin Terry Childs makes his case

    Posted February 18, 2009 - 10:57 am

    Charged network administrator Terry Childs says he would act differently if given a chance to relive his dispute with the City of San Francisco.
  • Cisco, Trend Micro put security in home routers

    Posted February 17, 2009 - 5:08 pm

    Cisco Systems is building a Trend Micro Internet security service into some home Wi-Fi routers to help protect families and small businesses from fraud, phishing and predators.
  • New attack singles out IE flaw

    Posted February 17, 2009 - 4:07 pm

    Trend Micro says it has spotted the first online attack based on a critical IE bug, patched last Tuesday.
  • Video

    Open Source + Amazon Storage = Less Backup Cost

    Posted February 17, 2009 - 2:32 pm

    Let's be honest: half of the companies reading this today are NOT backing up their data properly. That's the optimistic figure, because some backup industry analysts say about two-thirds of companies have backup issues that cause them grief. But there's hope for the unprepared half or two-thirds of you out there.
  • Tips for Hardening your Exchange Server

    Posted February 14, 2009 - 3:25 am

    Email is the main means of communications for both critical and non-critical information in business today. Therefore, having a reliable email service should be the main concern of any business operator. Here are 10 ways to have a reliable Exchange server and secured email services.
  • Time to Tweak Microsoft's Patch Tuesday?

    Posted February 13, 2009 - 5:02 pm

    Has Patch Tuesday outlived its usefulness?
  • Security Geeks: From Isolation to Rock Stars

    Posted February 13, 2009 - 4:59 pm

    Thanks to the blogosphere, social networking sites and podcasting made easy, many security pros are taking on a much more public persona, becoming near-rock stars.
  • Social Networking's Security Pitfalls

    Posted February 13, 2009 - 4:35 pm

    Spending a little time on Facebook and other social networking sites is a ritual for many of us every morning. And afternoon. And evening. But, hey, it's nice, harmless fun -- isn't it? It isn't as if you were putting your identity or your computer at risk. Are you? Well, ask anyone who was whacked by the recent Koobface worm.
  • Facebook Connect: What's Next for Your Facebook Info?

    Posted February 13, 2009 - 4:31 pm

    Although Facebook has big business plans for Connect, a technology that enables people to sign into multiple websites with their Facebook user name and password, the social network has proceeded carefully in this early stage as more questions about Facebook data ownership and privacy emerge.
  • Online dating: Blocking the bad guys

    Posted February 13, 2009 - 1:10 pm

    The list of people that clients don't want to meet online -- including sexual predators, pedophiles, scammers, spammers and plain old liars -- is a long one. Online dating sites have various approaches to keeping out undesirables. And at least one company offers a service to help users keep ahead of the bad guys.
  • Online dating: Your profile's long, scary shelf life

    Posted February 13, 2009 - 1:08 pm

    Online dating services have privacy policies that offer some assurances about how that data will be used and not used, but they don't necessarily delete your data after you've canceled your subscription and moved on. Many sites keep the profiles and related data long after you've left the service; some won't delete it unless you ask -- and others never delete it at all.
  • Apple issues massive security update for Mac OS X

    Posted February 13, 2009 - 12:54 pm

    Apple issued multiple updates for Mac OS X and Java that patched 55 bugs, including one for its Safari Web browser that prompted a security researcher to blast the company for a half-hearted approach to security.
  • With global effort, a new type of worm is slowed

    Posted February 13, 2009 - 10:39 am

    There have been big computer worm outbreaks before, but nothing quite like Conficker.
  • Curiosity drives Twitter "social virus"

    Posted February 12, 2009 - 10:27 pm

    Here's how a simple clickjacking trick fooled us all (well, most of us anyway).
  • Securing VoIP

    Posted February 12, 2009 - 6:12 pm

    There are too many sources of vulnerability for VoIP to ever be completely secure, says Patrick Park, author of VoIP Security. Here he describes the VoIP threat landscape and offers best practices for making VoIP reasonably secure.

  • Microsoft puts $250,000 bounty on Conficker worm

    Posted February 12, 2009 - 3:55 pm

    Microsoft is offering a $250,000 reward for information leading to the conviction of the Conficker worm's author.
  • HP, IBM push new OASIS encryption key standard

    Posted February 12, 2009 - 10:31 am

    A group of industry vendors, led by IBM, Hewlett-Packard and EMC, is proposing a new standard to make their encryption management software work together.
  • Hacker challenge takes aim at browsers, smartphones

    Posted February 11, 2009 - 9:51 pm

    The hacking contest that has grabbed headlines two years running will take aim next month at browsers and smartphones, according to the security company that sponsors the "PWN2OWN" challenge.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Join today!

See more content
Ask a Question