Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.
  • A sneaky security problem, ignored by the bad guys

    Posted November 15, 2008 - 4:11 pm

    Frank Boldewin had seen a lot of malicious software in his time, but never anything like Rustock.C.
  • Video

    Time to Filter Facebook?

    Posted November 14, 2008 - 11:03 am

    Just after my post about The Facebook Productivity Sink Hole, the Internet monitoring company 8e6 Technologies sent me a note about their recent study. They surveyed 1000 businesses, 500 in the US and 500 in the UK, and found the problem crosses the pond faster than bad reality TV plots stolen by Hollywood.

  • Microsoft Plans a More Trusted Internet

    Posted November 14, 2008 - 5:52 am

    According to Scott Charney, Corporate Vice President, Trustworthy Computing, Microsoft Corp., the Internet has had a positive impact on many, many aspects of our society, but greater global connectivity combined with the increasingly valuable information stored online has resulted in a new array of threats and an increase in cybercrime.
  • Sued Over Deceptive Emails

    Posted November 14, 2008 - 5:47 am

    Ars Technica is reporting that a customer of, a people finding and social networking service, is suing them for sending deceptive emails that trick people into signing up for their paid service. Read the rest of this entry>>

  • Mozilla fixes 11 Firefox flaws, six critical

    Posted November 13, 2008 - 1:56 pm

    Mozilla on Wednesday patched 11 vulnerabilities in Firefox 3.0 -- and 12 bugs in the older Firefox 2.0 -- that could be used to compromise computers and steal information.
  • Worm Risk Spurs Critical Microsoft Patch

    Posted November 13, 2008 - 12:01 pm

    A scary security flaw that would allow malicious worms to infect one PC and then automatically jump to others prompted Microsoft to release a rare out-of-cycle patch in October.
  • $1 million award offered to nab extortionist in data breach

    Posted November 13, 2008 - 11:59 am

    Express Scripts, the pharmacy benefits management company which recently disclosed an extortionist is demanding money by threatening to expose millions of patient records the company holds, Wednesday said it has decided to offer $1 million to nab the perpetrator.
  • Microsoft's exploit predictions are less than half right

    Posted November 13, 2008 - 11:52 am

    Microsoft today called its first month of predicting whether hackers will create exploit code for its bugs a success -- even though the company got its forecast right less than half the time.
  • Equifax Over 18 I-Card proves you're old enough

    Posted November 13, 2008 - 11:39 am

    Credit rating agency Equifax has introduced a way to prove that you're over 18 on the Internet.
  • The flipside of spam protection: Keeping your business out of blacklists

    Posted November 13, 2008 - 5:43 am

    We do pay a lot of attention to filtering out spam, and rightly so. The vast majority of all email traffic is spam, and while some of it is merely annoying, some also contains dangerous malware in the form of attachments, or links to malicious web sites. It drains bandwidth and saps productivity.
  • How to Protect Your Private Key

    Posted November 13, 2008 - 5:37 am

    In the world of Certificate Authorities and digital signatures there still exist questions about who gave the authority to the CA’s to authorize the certificates? And although a certificate has been granted, how should we treat a private key that is suspected as having not come from the authorized owner?
  • What are the considerations of installing Email Security Software?

    Posted November 13, 2008 - 5:36 am

    After migrating to Exchange, a team member and I asked ourselves about the strategized about the next piece of this puzzle. Should we install email security software on the Exchange Server or a separate server?
  • Source of 75% of sent spam forced offline

    Posted November 13, 2008 - 5:31 am

    A web hosting company allegedly responsible for at least 75% of the daily spam volume worldwide has been forced offline, thanks to evidence gathered by security experts. McColo Corp, based in California, had its service terminated by its ISP, Hurricane Electric earlier today.
  • Phishing Scams Rise as Banks Fail

    Posted November 13, 2008 - 5:29 am

    As the economic crisis appears to peak, more banks will fail. This has experts predicting that new phishing scams will arise targeted at the customers of those banks, and the agencies helping those customers may be actually encouraging such attacks.
  • Microsoft explains seven-year-old patch delay

    Posted November 12, 2008 - 5:33 pm

    Microsoft Tuesday explained why it had been unable to patch a seven-year-old bug until recently, saying that it was only in the last year that it figured out how to fix the flaw without breaking most network-based applications.
  • IBM's ISS blasts security rival Trend Micro over bugs

    Posted November 12, 2008 - 5:08 pm

    In an unusual move, a security company owned by IBM has publicly blasted a rival for not patching reported bugs in its enterprise-grade, server-side antivirus software.
  • How recessions make good people do bad things

    Posted November 12, 2008 - 4:38 pm

    Greed, anger or desperation are what motivate insiders to attack their own companies. Here are some of the insider issues to look out for during a recession...
  • ISP cut off from Internet after security concerns

    Posted November 12, 2008 - 1:57 pm

    A U.S.-based ISP suspected of aiding cybercriminals in online scams and hosting child pornography was at least partially cut off from the Internet Tuesday.
  • Microsoft security patch was seven years in the making

    Posted November 11, 2008 - 10:06 pm

    An SMB bug fixed by Microsoft Tuesday was publicly disclosed more than seven years ago.
  • IT admin used inside knowledge to hack and steal

    Posted November 11, 2008 - 9:22 pm

    A former IT administrator has pleaded guilty to charges of hacking his former employer and breaking into other Bay Area companies.
  • Study: critical infrastructure often under cyberattack

    Posted November 11, 2008 - 11:46 am

    Computer systems that run the world's critical infrastructure are not as secure as they should be and insiders are mad.
  • Myth or truism? Security experts judge

    Posted November 11, 2008 - 10:50 am

    They are etched into the conventional wisdom of IT security, but are these 12 articles of faith (to some) actually wise, or are they essentially myths? A panel of experts offer their judgments.
  • Researchers Hijack Storm Worm

    Posted November 11, 2008 - 5:18 am

    Researchers at the University of California, San Diego and Berkley successfully infiltrated the Storm Worm to measure the conversion rate of spam. They found that it took only a single response from 12 million spams sent for spammers to reap huge profits.
  • L.A. City Engineers Hack Computer Traffic System

    Posted November 11, 2008 - 5:14 am

    You always read about how most computer hacking jobs are done from the inside. Well here’s another story to add to the proof that most hacking jobs are inside jobs.
  • Protecting your network against email threats

    Posted November 11, 2008 - 4:58 am

    The widespread use of email has provided hackers and crackers with an easy way to distribute harmful content to the internal network. Hackers can easily circumvent the protection offered by a firewall by tunneling through the email protocol, since it does not analyze email content.
Join us:






Join today!

See more content
Ask a Question