Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.
  • Why Bayesian filtering is the most effective anti-spam technology

    Posted October 3, 2008 - 6:44 am

    Achieving a 98%+ spam detection rate using a mathematical approach

    This white paper describes how Bayesian mathematics can be applied to the spam problem, resulting in an adaptive, ‘statistical intelligence’ technique that achieves very high spam detection rates.
  • Vendors fixing bug that could crash Internet systems

    Posted October 2, 2008 - 9:17 pm

    Internet infrastructure vendors are working on patches for a set of security flaws that could help hackers knock servers offline with very little effort.
  • Skype says it was unaware of China message-logging

    Posted October 2, 2008 - 8:20 pm

    In a blog posting to the eBay subsidiary's corporate blog, Skype President Josh Silverman said his company had no idea that the Tom-Skype software, distributed to Skype users in China, was logging chat messages and storing them on a publicly accessible server.
  • VoIP Still Not Ready For Carrier-Grade Networks

    Posted October 2, 2008 - 1:22 pm

    After a quick tour of some Really Talented Groups dedicated to fuzzing research, I noticed three things: 1) Most teams are focused on fuzzing VoIP 2) Most if not all VoIP devices still break with fuzzing 3) Most VoIP vendors still do not get it. The tour continues...
  • Survey: Many computer users lack basic security precautions

    Posted October 2, 2008 - 1:19 pm

    Cybersecurity efforts in the U.S. government and many businesses are improving, but many individual computer users still don't take basic precautions against cyberattacks, say cybersecurity experts.
  • Security researcher reveals iPhone design flaws

    Posted October 2, 2008 - 10:52 am

    Apple's iPhone has two design flaws that could pose potential security problems, says security researcher Aviv Raff.
  • Skype messages being monitored in China, group says

    Posted October 2, 2008 - 10:17 am

    Tom-Skype, a joint venture in China between eBay's Skype unit and Tom Online, has been known to operate a text filter on text chats, but a new report says that the data is stored insecurely and the text messages and records containing personal data can be easily accessed.
  • Allow Myself to Introduce Myself...

    Posted October 2, 2008 - 8:29 am

    Hello Everyone.

    My name is Brandon Carroll and I am a Cisco Certified Instructor for Ascolta training as well as an Author for Cisco Press. My most recent publication is the CCNA Wireless Official Exam Certification Guide (CCNA IUWNE 640-721). I regularly blog at my personal site found at

  • E-passport demo shows weaknesses in new border controls

    Posted October 1, 2008 - 8:15 pm

    The data on the radio chips in so-called e-passports can be cloned and modified without detection, representing a gaping security hole in next-generation border control systems, according to security researchers.
  • How to create a security awareness program

    Posted September 30, 2008 - 10:42 pm

    The following are just a few rough ideas for you to expand upon and build your own information security awareness program. October is National Information Security Awareness Month. It is a good time to tie into a larger effort to bring awareness of security topics to all computer users.
  • Review

    Sandbox security versus the evil Web

    Posted September 30, 2008 - 3:45 pm

    Vendors have been scratching their collective heads attempting to make more consumers safer online. One of the results has been a class of anti-malware software that I call sandbox protection products. These items encapsulate Internet browsers (and e-mail programs and sometimes any other program you can run) within a virtual, emulated cocoon designed to keep malware from reaching and modifying the underlying host computer.
  • 23 things I wish would just go away

    Posted September 30, 2008 - 3:01 pm

    It's list season so I may as well join in -- with something that resembles the "little list" made famous by Ko-Ko, Lord High Executioner in Gilbert and Sullivan's classic The Mikado. He sings of "offenders who might well be underground, and who never would be missed." Me, too.
  • Two tenacious exploits debunk vendor claims

    Posted September 30, 2008 - 2:19 pm

    In my testing of five sandbox security clients -- Authentium's SafeCentral, Check Point's ZoneAlarm ForceField, Prevx, Sandboxie, and SoftSphere Technologies' DefenseWall HIPS -- I exposed all the products to dozens of malicious attacks, both well known and not so well known. Two malware programs, in particular, stretched the various competitors to their breaking points: the Adobe Flash clipboard hijack exploit and the XP Antivirus malware program.
  • Sophos concludes €217 million Utimaco buy

    Posted September 30, 2008 - 1:13 pm

    Antivirus vendor Sophos has concluded its acquisition of Utimaco Software, a seller of data encryption software.
  • How the information-centric security approach can protect sensitive company information

    Posted September 30, 2008 - 11:53 am

    How the DRM approach further protects company data?

  • Clickjacking vulnerability to be revealed next month

    Posted September 30, 2008 - 9:51 am

    After shelving plans to detail a browser clickjacking vulnerability that is indirectly related to Adobe Systems' products at the company's request earlier this month, a security researcher plans to detail the flaw next month.

  • Prominent Web sites found to have serious coding flaw

    Posted September 30, 2008 - 9:49 am

    Two Princeton University academics have found a type of coding flaw on several prominent Web sites that could jeopardize personal data and in one alarming case, drain a bank account.
  • Researchers develop bug-blocking chip monitor

    Posted September 29, 2008 - 9:15 pm

    Researchers at the University of Michigan have developed technology that can fence off microprocessor bugs and keep them from seizing up a PC.
  • A pro's tips on ATM fraud

    Posted September 29, 2008 - 8:36 pm

    A bank-machine hacker who reportedly was arrested earlier this month in Turkey gave would-be fraudsters tips on how to install rogue card-reading devices, including advising them to target drive-through ATMs (automated teller machines) and avoid towns with fewer than 15,000 residents.
  • Washington state pursues 'scareware' distributors

    Posted September 29, 2008 - 2:22 pm

    The Washington state attorney general's office has sued a Texas man for sending "scareware" and is asking the court to require him to stop his activities and pay restitution to people who fell for his alleged scam.
  • Mozilla patches Firefox faster than expected

    Posted September 29, 2008 - 2:06 pm

    Mozilla beat its own schedule by patching Firefox late Friday to fix a password bug it had inadvertently introduced earlier in the week.
  • Security risks rise as smartphones become smarter

    Posted September 29, 2008 - 12:07 pm

    As wireless devices become more numerous within businesses, their convenience will be counterbalanced by an increasing potential for security problems, according to a Gartner analyst.
  • How to fortify your connection

    Posted September 29, 2008 - 10:35 am

    Mobile workers connect to hot spots in airports and hotels, they access the Internet through their home router while working from home and they use public WiFi to check company email while taking a coffee break at Starbucks. It's essentially impossible for anyone in today's business climate to completely avoid public networks. But there are things you can do to keep your company's IP safe.
  • Enterprises overpay for antivirus software, says analyst

    Posted September 29, 2008 - 9:50 am

    Enterprises continue to pay too much for security software -- while the software vendors aren't doing enough research to keep up with fast-changing threats on the Internet, a Gartner analyst said Monday.
  • Trojan can grab extra personal banking data

    Posted September 28, 2008 - 8:36 pm

    A Trojan horse program now available to a growing number of fraudsters can add data entry fields to legitimate online banking sites and entice consumers to give up sensitive information such as bank card numbers and PINs (personal identification numbers).
Join us:






SecurityWhite Papers & Webcasts

See more White Papers | Webcasts

Join today!

See more content
Ask a Question