Security

RSS
Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.
  • IBM software protects against internal attacks

    Posted February 24, 2006 - 11:06 am

    IBM Corp. announced a new security product Friday that helps protect companies from internal attacks on their IT systems.
  • FTC settles with CardSystems over data breach

    Posted February 24, 2006 - 8:34 am

    CardSystems Solutions has settled with the FTC over allegations that it failed to protect consumer data in last year's security breach. The full terms of the settlement have not yet been published, but among them, the company will face an audit every other year for the next 20 years.
  • Perimeter buys Breakwater

    Posted February 24, 2006 - 8:33 am

    Perimeter Internetworking, a managed security services company, will pay $2 million to acquire Breakwater Security, a specialist in information risk management, in a move that expands its geographical reach.
  • Mac attack a load of crap

    Posted February 24, 2006 - 8:32 am

    While the two recently discovered vulnerabilities in Mac OS X and the Safari Web browser have Mac critics crowing that the flaws prove Mac OS is no more inherently secure than Windows -- it just hasn't been targeted due to low market share -- one Apple fan says he has no plans to alter his system or his Web surfing habits: "The smuggest of smug Mac users is right: the platform is more secure, and these new security threats are no more threatening that a paraplegic kitten," he writes.
  • Apple's Safari still a sitting duck?

    Posted February 24, 2006 - 8:32 am

    Following up on a "Vulnerability Note" issued last week by US Cert about a security flaw in Apple's Mac OS X Safari Web browser, the security organization has now released a Cyber Security Alert.
  • Is the iDefense challenge worth it?

    Posted February 24, 2006 - 8:30 am

    Should a company offer a cash reward for discovering flaws in software? That's the question at the heart of a debate over a quarterly hacking challenge being sponsored by VeriSign division iDefense, which will pay a $10,000 reward for finding security vulnerabilities in Microsoft products.
  • Tech makes working harder, not easier

    Posted February 24, 2006 - 8:27 am

    Day-Timers, the maker of paper-based organizational products, has released a survey that it says shows people are less productive with all of the technology at their fingertips rather than more productive.
  • Sun to buy patch management vendor Aduva

    Posted February 23, 2006 - 10:06 am

    Sun Microsystems Inc. has agreed to acquire patch management specialist Aduva Inc., of Sunnyvale, California, officials said Wednesday.
  • Web services may threaten enterprise security

    Posted February 22, 2006 - 10:41 am

    Clear text messages used in transferring applications via Web services can potentially slip through existing security hardware allowing malformed code to run rampant within organizations.
  • Impact of worm targeting Mambo CMS low, say researchers

    Posted February 21, 2006 - 9:50 am

    F-Secure Corp. is warning of a network worm that targets vulnerabilities in the Mambo Content Management System (CMS) and PHP XML-RPC, a library of code for PHP programmers that allows procedures to run between computers with different operating systems.
  • Large scale successes for viruses in January

    Posted February 21, 2006 - 9:45 am

    An unusual number of virus attacks succeeded on a large scale in January, according to figures released last week, with an increasing number of viruses managing to wreak havoc before anti-virus vendors could respond.
  • Hackers follow patches with malware

    Posted February 17, 2006 - 4:55 pm

    Hackers have released software that could be used to take over Windows PCs that lack the latest Microsoft security patches. But while this code is dangerous, security experts said Friday that it had yet to be used by attackers in any widespread way.
  • First Apple virus shocks Mac users to the core

    Posted February 17, 2006 - 11:14 am

    Mac users, welcome to the world of worms. Security experts have discovered Leap-A, the first virus known to attack the Mac OS X platform.
  • Red Hat strengthens security

    Posted February 17, 2006 - 11:13 am

    Linux developer Red Hat has announced plans to beef up its Linux security this year, including updates to the Red Hat Certificate System (RHCS), to which it will add support for smartcards and automated log-ins, among other enhancements.
  • Passwords pass

    Posted February 17, 2006 - 11:13 am

    The 2006 RSA Conference was highlighted by Bill Gates declaring the death of the password and products that provide alternatives, like security tokens that generate one-time access codes.
  • MacOS X worm wiggles its way into wild

    Posted February 17, 2006 - 9:22 am

    A worm that affects computers running Apple Computer Inc.'s MacOS X operating system is circulating on the Internet, according to antivirus software makers.
  • Microsoft patch fails to install for some users

    Posted February 15, 2006 - 11:26 am

    Microsoft Corp. has reported a problem with one of its security patches released Tuesday that requires some users to take additional steps to ensure it installs properly.
  • CIO Interview: CIO of Aflac, Gerald Shields

    Posted February 14, 2006 - 5:49 pm

    The CIO of Aflac talks about minimizing risk, disaster preparedness and privacy issues.

  • The Need for Email Resilience

    Posted February 14, 2006 - 5:32 pm

    In today's networked world, the free flow of information can also be a hindrance.

  • Mobile and Malicious

    Posted February 14, 2006 - 5:28 pm

    Smartphones are increasingly used to store confidential data, but CIOs must ensure they don't present a security risk.

  • Preparing for a Disaster

    Posted February 14, 2006 - 5:24 pm

    Terror attacks and hurricanes are more real than ever. CIOs must prepare for the worst.

  • Security and the Bottom Line

    Posted February 14, 2006 - 5:18 pm

    It's up to the CIO to communicate the true impact of threats like phishing and pharming.

  • Do Not Delegate Security

    Posted February 14, 2006 - 4:55 pm

    Every company needs to understand what it wants from security and practice it from the top down.

  • CIO Interview: CIO of Port of Portland, Michelle Gaines

    Posted February 14, 2006 - 4:43 pm

    The CIO of Port of Portland talks about electronic records management, demand for wireless services and growing ITsecurity threats.

  • Drag-and-drop flaw in Explorer reported

    Posted February 13, 2006 - 2:33 pm

    Security analysts and vendors are reporting a flaw in Microsoft Corp.'s Internet Explorer browser that could allow malicious code to run and result in a hacker taking over complete control of a computer.

Join today!

See more content
Ask a Question
randomness