Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.
  • Survey: VARs concerned about cybersecurity, health care

    Posted September 4, 2008 - 12:13 pm

    Many U.S. businesses fail to take Internet security protection seriously and are unwilling to spend money on additional protection, according to a recent survey of value added resellers (VARs) by the Computing Technology Industry Association.
  • (Is There) Motivation for VoIP Fuzzing

    Posted September 4, 2008 - 3:06 am

    What have we learned during these six or so years of proactive security work with VoIP fuzzing? Here is my top ten discoveries.
  • Early security issues tarnish Google's Chrome browser

    Posted September 3, 2008 - 8:44 pm

    Security researchers have reported finding vulnerabilities in Chrome, the new web browser from Google, just a day after it was released in beta.
  • Spam mailers use free Web services to shield links

    Posted September 3, 2008 - 12:19 pm

    Spammers are abusing free Web services to make their spam links look more legitimate, according to e-mail security vendor MessageLabs.
  • BI and mashup security

    Posted September 2, 2008 - 4:30 pm

    I hate to be the teetotaler at the mashup party, but someone has to take a sober look at the security implications of this emerging approach to BI.
  • At the front lines of protecting the Internet

    Posted September 2, 2008 - 3:59 pm

    VeriSign is in many ways synonymous with managing the Web, thanks to its handling of key DNS root servers and of name resolution for .com, .net, and other domains. In recent years, it's had both strong ups and strong downs. In this interview, VeriSign CTO Ken Silva discusses the company's current and past challenges.
  • Internet Explorer 8 Privacy Mode Isn't

    Posted August 29, 2008 - 9:49 pm

    Pity those users hoping the new “porn mode” in IE8 will cover the tracks left while looking for the uncovered. Once again, Microsoft overpromises and underdelivers in IE 8 and leaves a security hole.

  • Alphabet decides who gets most spam

    Posted August 29, 2008 - 3:37 pm

    Cambridge University security expert Richard Clayton analyzed email traffic logs from Demon Internet and discovered that those with names that begin with A are more likely to receive spam that those who start with Z.
  • Big Brother Browser: Internet Explorer 8 Beta 2

    Posted August 29, 2008 - 2:20 pm

    This is a link to my Technical Blog on our company website where I've been researching the new Internet Explorer 8 from Microsoft. Did you ever just have one of those gut feelings?

    It's very scary to think about the type of data they're gathering!
  • Survey: IT staff would steal secrets if laid off

    Posted August 29, 2008 - 11:58 am

    Cyber-Ark's annual 'Trust, Security & Passwords' finds that a whopping 88% of IT administrators would take corporate secrets if they were suddenly laid off. The survey also found that one third of IT staff admitted to snooping around the network, looking at highly confidential information, such as salary details and people's personal emails.
  • Apple promises September fix for iPhone security flaw

    Posted August 28, 2008 - 5:19 pm

    A recently discovered security flaw that would allow access to a locked iPhone will be fixed next month, Apple said on Thursday.
  • European court won't stop UK hacker's extradition to US

    Posted August 28, 2008 - 1:20 pm

    The European Court of Human Rights has refused U.K. hacker Gary McKinnon's appeal against demands for his extradition to the U.S. McKinnon stands accused of breaking into computers belonging to NASA and the U.S. military, and had appealed against his extradition under Article 3 of the European Convention on Human Rights.
  • Defending Islam, hacker defaces thousands of Dutch websites

    Posted August 28, 2008 - 9:54 am

    A 'hacktivist' has hijacked numerous Dutch sites in retaliation for the anti-Islamic short film "Fitna" which was made and released earlier this year by the Dutch right-wing politician Geert Wilders.
  • Malware infects space station laptop

    Posted August 27, 2008 - 4:57 pm

    Malware has managed to get off the planet and onto a laptop on the International Space Station, NASA confirmed today. And it's not the first time that a worm or virus has stowed away on a trip into orbit.
  • Build your own free security suite

    Posted August 27, 2008 - 10:37 am

    Do-it-all suites are the name of the security game these days. Sure, you can gather free programs that cover the bases much as a suite would, but who wants to bother with finding out which apps work together and which ones might leave you pulling your hair out? We do. And what's more, we did--all so that you could have an easy-to-follow guide to building your own free suite.
  • Locked iPhones can be unlocked without a password

    Posted August 27, 2008 - 10:23 am

    Private information stored in Apple's iPhone and protected by a lock code can be accessed by anyone with just a few button presses.
  • Recording All Activity on a Server

    Posted August 27, 2008 - 6:00 am

    Ever wanted to record everything anyone does while logged on to your server? Here's a product that can help you do just that.
  • Trojans and viruses are out to get you

    Posted August 26, 2008 - 9:37 pm

    Have you received your virus-infected e-mail yet today? I don't know what's up, but in the last week I've received dozens of e-mails with a virus infected attachment or a link to a backdoor Trojan horse. There are three variations and all have one thing in mind--luring me into getting zapped with a nasty payload.
  • Privacy group: US border-crossing database raises concerns

    Posted August 26, 2008 - 9:26 pm

    A plan by U.S. Customs and Border Protection (CBP) to collect personal information on every traveler coming into the country and keep that information in a database for 15 years could have huge privacy implications for U.S. residents, one privacy group said.
  • When to Worry About Security Holes--and When Not To

    Posted August 26, 2008 - 8:29 pm

    To help you determine whether a particular alert is worthy of Chicken Little or is truly dangerous, here are translations for some of the most common threat terms.
  • Port forwarding

    Posted August 26, 2008 - 1:43 pm

    Port forwarding can get you around some sticky network restrictions and is easy to set up with ssh. Let's look at what it is and how it works with a simple example that you can try on your own systems.
  • PGP upgrades encryption wares

    Posted August 25, 2008 - 8:51 pm

    PGP is upgrading three of its products to give security policymakers greater flexibility when working with its encryption technology.
  • Microsoft to add privacy features to IE8

    Posted August 25, 2008 - 8:37 pm

    Microsoft on Monday described some new privacy features that will come with IE8, the next release of its browser. The features are designed to make it easier for people to delete and control information about their Web browsing history.
  • Researcher warns of Vista vulnerabilities

    Posted August 25, 2008 - 1:43 pm

    A New Zealand security researcher is exploring several scenarios in which Windows Vista could be attacked and warns more protection is needed for users.
  • Abaca Virtual Email Protection Gateway Achieves VMware Virtual Appliance Validation

    Posted August 25, 2008 - 2:56 am

    SAN JOSE, CALIF., August 19, 2008 – Abaca Technology Corporation, an innovator in email protection and messaging security, announced today that the Abaca Virtual Email Protection Gateway VPG 1500 is now a validated VMware virtual appliance and available for download from

Join us:






Join today!

See more content
Ask a Question