Security

RSS
Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.
  • Apple pushes MobileMe surprise to XP, Vista

    Posted July 22, 2008 - 11:22 am

    Apple Inc. installed a control panel applet for its MobileMe online sync and storage service on Windows XP and Windows Vista systems when they were updated to iTunes 7.7 -- the second time this year that it's bundled new software with an update for an existing program.
  • Better law enforcement -- always good for us?

    Posted July 22, 2008 - 10:47 am

    If law enforcement improves, we will all be safer. Right? Well actually, maybe not.
  • Details of major Internet flaw posted by accident

    Posted July 22, 2008 - 9:12 am

    A computer security company on Monday inadvertently published details of a major flaw in the Internet's Domain Name System (DNS) several weeks before they were due to be disclosed.
  • Abaca Has Developed a New Paradigm that Spammers Cannot Defeat, According to Osterman Research

    Posted July 22, 2008 - 2:40 am

    Abaca Technology Corporation, an innovator in email protection and messaging security, announced today that a new white paper by Osterman Research, a leading analyst firm that specializes in topics related to messaging and collaboration, is now available on the Abaca Web site. Titled "A New Approach to Defeating Spam," the white paper describes the problems caused by spam, the techniques spammers use to circumvent conventional anti-spam solutions, and the new paradigm Abaca has developed to combat spam.
  • Open-source software a security risk, study claims

    Posted July 21, 2008 - 9:31 pm

    Open source software is a significant security risk for corporations that use it because in many cases, the open source community fails to adhere to minimal security best practices, according a study released Monday.
  • Kaspersky Lab's Malaysian Web site hacked

    Posted July 21, 2008 - 11:19 am

    Russian security company Kaspersky Lab's Web site for Malaysia was defaced on Saturday along with one of its online shopping sites, according to Zone-H, an organization that documents such attacks.
  • Georgia president's Web site falls under DDOS attack

    Posted July 21, 2008 - 11:16 am

    The Web site for the president of Georgia was knocked offline by a distributed denial-of-service (DDOS) attack over the weekend, yet another in a series of cyberattacks attacks against countries experiencing political friction with Russia.
  • RIM fixes critical BlackBerry Enterprise Server bug

    Posted July 18, 2008 - 2:58 pm

    Research in Motion patched a critical bug in its BlackBerry Enterprise Server (BES) Friday to stymie hackers hoping to break into company networks by tricking users of the popular smart phone into opening rigged PDFs.
  • Firefox 3.0.1 patches Mac-only bug

    Posted July 18, 2008 - 2:56 pm

    Mozilla Corp. patched three critical vulnerabilities in Firefox 3.0 this week, including a Mac-specific bug reported by Apple Inc., not just two as originally reported.
  • Facebook bug leaks members' birthday data

    Posted July 18, 2008 - 11:41 am

    A glitch in a test version of Facebook's Web site inadvertently exposed the birthdays of Facebook's 80 million members this week.
  • UnitedHealthcare insider charged in Cal data theft

    Posted July 18, 2008 - 11:32 am

    A former UnitedHealthcare employee has been charged with stealing customer data in connection with a rash of identity thefts at the University of California, Irvine.
  • Beware the hacker next door

    Posted July 18, 2008 - 10:22 am

    The most common hacker is someone who gets to work early, takes his or her turn cleaning out the office fridge, tells funny stories at lunch and, at some point, makes a very dumb move. It often starts when this hacker-next-door sees a file directory or workstation that’s just too juicy to pass by, like one named "Salary Comparison." It’s simply too tempting NOT to peek inside.
  • New worm transcodes MP3s to try to infect PCs

    Posted July 18, 2008 - 9:53 am

    A new kind of malicious software could pose a danger to Windows users who download music files on peer-to-peer networks.
  • IT administrator pleads not guilty to network tampering

    Posted July 17, 2008 - 4:57 pm

    A disgruntled network administrator pleaded not guilty Thursday to charges of computer tampering for allegedly setting up an unauthorized access system and holding hostage much of the city of San Francisco's computer network.

  • Securing VoIP Networks: Key Management Mechanisms

    Posted July 17, 2008 - 4:18 pm

    Key management is a fundamental part of protecting Internet multimedia applications such as VoIP. At the same time, key management protocols are difficult to design, especially for multimedia applications that require group participation (for example, videoconferencing, broadcasting or multicast audio, video or file transfer).
  • Cybercrime and Politics: The Dangers of the Internet in Elections

    Posted July 17, 2008 - 3:52 pm

    While we first saw the Internet used extensively during the 2004 U.S. presidential election, its use in future presidential elections will clearly overshadow those humble beginnings. It is important to understand the associated risks as political candidates increasingly turn to the Internet in an effort to more effectively communicate their positions, rally supporters, and seek to sway critics. These risks include, among others, the dissemination of misinformation, fraud, phishing, malicious code, and the invasion of privacy. Some of these attacks, including those involving the diversion of online campaign donations, have the potential to threaten voters' faith in the U.S. electoral system.
  • Enforcing Strong Passwords

    Posted July 16, 2008 - 5:45 pm

    You, as a savvy Windows Vista user, know how to create a strong password, and you can certainly pass along that information to the other people in your home or business, but how can you be sure that they'll take up the strong password gospel?
  • Free iPhones -- then what?

    Posted July 16, 2008 - 5:15 pm

    Is free a good thing? Maybe not. Let's consider the impact on Internet security of heavily discounted smartphones. It could be quite a disaster.
  • Spammer gets 30 months for inundating AOL

    Posted July 16, 2008 - 4:32 pm

    A 27-year-old man was sentenced to 30 months in prison Tuesday for blasting AOL subscribers with spam over a four-month period.
  • Data can leak from partially encrypted disks

    Posted July 16, 2008 - 4:28 pm

    If you're using encryption software to keep part of your computer's hard drive private, you may have a problem, according to researchers at the University of Washington and British Telecommunications.
  • Mozilla patches Firefox side of Safari 'carpet bomb' threat

    Posted July 16, 2008 - 1:24 pm

    Mozilla Corp. has patched a pair of critical vulnerabilities in Firefox, taking the unusual step of updating the older version 2.0 on Tuesday but delaying the fixes for the newer version 3.0 until Wednesday.
  • Woman fired over death threat sent from work e-mail

    Posted July 16, 2008 - 10:34 am

    An employee of 1-800-Flowers.com has been fired after an e-mailed death threat was linked to her account.
  • Greatest Challenge in VoIP Security

    Posted July 16, 2008 - 3:08 am

    The greatest challenge in VoIP security is that there are very few good example case studies available. There are some very good VoIP deployments. But try to find a white-paper with someone disclosing all the their success stories in building a perfect VoIP network. No luck! Unfortunately much of that data is hidden in confidential documents. Still, I have really loved to see VoIP security emerge and evolve from being a hindrance in VoIP deployment, into a key marketing value. Finally some of those success stories will get a chance to see daylight.
  • Soloway case reveals big business behind spam

    Posted July 15, 2008 - 5:09 pm

    Selling the tools used by spammers is easy money, at least until you get caught. Just ask Adam Sweaney, a man charged with computer fraud who took the stand at the sentencing hearing in Seattle for Robert Soloway, the so-called spam king.
  • Researchers trace structure of cybercrime gangs

    Posted July 15, 2008 - 10:35 am

    The latest research from Web security company Finjan, released on Tuesday, finds that online crime is becoming a broad, well-organized, Mafia-like endeavor with a pyramid of hackers, data sellers, managers and malicious programmers, all working in a fluid management structure in order to profit from cybercrime.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Join today!

See more content
Ask a Question
randomness