Off the Wire

Off The Wire Archive

News items for March 2006

New Bagle, new trick
First things first: admins, block http access from your network to endoliteindia.com. [more]
Friday, 31 March 2006, 12:07 PM CET


The inner working of a Bayesian spam filter
The Bayesian Theory, when applied to spam mail, is a very effective method of detecting which emails are legitimate or not. [more]
Friday, 31 March 2006, 12:06 PM CET


The other side of the US Lenovo spy probe
The USCC launched a probe against Lenovo, but many wonder if the accusations are warranted. [more]
Friday, 31 March 2006, 12:03 PM CET


E-bullying on rise, say experts
The use of new technology such as text messaging in order to bully children is increasing, researchers have said. [more]
Friday, 31 March 2006, 12:01 PM CET


Security hole digs into Microsoft
For the second time this year, Microsoft is scrambling to fix a critical security hole in its Internet Explorer Web browser, a flaw cybercrooks found and have already begun to exploit. [more]
Friday, 31 March 2006, 11:57 AM CET


IT worker disputes state government security breach
A New Hampshire state IT employee who was placed on paid leave last month after an alleged security breach involving a government server is disputing the state's explanation of the incident. [more]
Friday, 31 March 2006, 11:56 AM CET


Remote access is no longer a luxury
Mobile sales teams, remote workers, telecommuters, strategic partners and other trusted users all need timely, secure access to specific data on your corporate network. [more]
Friday, 31 March 2006, 3:24 AM CET


The Top 10 information security myths
If you buy into all of these commonly held beliefs, you'd better believe your data is at risk. We separate the facts from fiction. [more]
Friday, 31 March 2006, 3:04 AM CET


Government CIO survey: IT security a top priority
I.T. security and privacy remain federal CIOs' top concerns, says Paul Wohlleben, a partner at Grant Thornton. [more]
Friday, 31 March 2006, 2:51 AM CET


Former employees threaten network security
Think your network is secure if you're able to fend off the ever-growing barrage of hackers? Think it's even safer if you monitor employees to make sure they're not up to no good? [more]
Friday, 31 March 2006, 2:31 AM CET


Netgear ProSafe VPN Firewall 50 review
Netgear is undoubtedly best know for its consumer networking products but its ProSafe router lineup aims to provide businesses with that little bit more in terms of features and security options. [more]
Friday, 31 March 2006, 2:14 AM CET


IT security staff need more knowledge
IT security professionals are increasingly required to have a rounded knowledge of business practices in addition to technical expertise, industry experts have stated. [more]
Friday, 31 March 2006, 2:01 AM CET


Barclays uses monitor system to fight fraud
Fraud-detection technology will analyse online banking transactions. [more]
Friday, 31 March 2006, 1:50 AM CET


Japanese tune into quasar encryption
Randomness makes for secure comms. [more]
Friday, 31 March 2006, 1:12 AM CET


House panel approves data protection bill
Bill requires data brokers to develop security policies that explain the "collection, use, sale, other dissemination, and security" of the data they hold. [more]
Friday, 31 March 2006, 12:46 AM CET


Zyxel Zywall 35 UTM security appliance review
Broad-spectrum protection on a budget. [more]
Friday, 31 March 2006, 12:07 AM CET


Review: Trustware BufferZone 1.6
Security company Trustware has a product that takes a new approach on protecting the end users. BufferZone is centered on a concept of virtualization technology, that creates a whole new secluded environment on your computer. [more]
Thursday, 30 March 2006, 10:01 PM CET


MIT spam conference focuses on phishing
Nature of unwanted e-mail is becoming more dangerous, speakers say. [more]
Thursday, 30 March 2006, 2:44 PM CET


Crash course: interior routing protocols
Picking the right interior routing protocol for your network is crucial for delivering your business applications end-to-end without undue costs or delays. There's certainly plenty to choose from, including RIPv1, OSPF and IS-IS, as well as Cisco's IGRP and EIGRP if you're mostly a Cisco shop. We discuss each protocol, as well as when to use which one. [more]
Thursday, 30 March 2006, 2:42 PM CET


Microsoft announces IE 7 bug site
Microsoft has launched an Internet Explorer Feedback page to receive the next stream of bugs expected for its forthcoming IE 7 browser. [more]
Thursday, 30 March 2006, 2:39 PM CET


Packet-sniffing techie uncovers spousal infidelity
Warning: technology can end your relationship. [more]
Thursday, 30 March 2006, 2:33 PM CET


First Trojan spy for Symbian phones
Flexispy.A is a Symbian trojan spy that records information about the victim's phone calls and SMS messages, then sends them to a remote server. [more]
Thursday, 30 March 2006, 5:12 AM CET


Password checker
Your online accounts, computer files, and personal information are more secure when you use strong passwords to help protect them. [more]
Thursday, 30 March 2006, 4:16 AM CET


Open source security testing methodology
Truth is made of numbers. Following this golden rule, Federico Biancuzzi interviewed Pete Herzog, founder of ISECOM and creator of the OSSTMM, to talk about the upcoming revision 3.0 of the Open Source Security Testing Methodology Manual. [more]
Thursday, 30 March 2006, 3:53 AM CET


Laptop thefts prompt new security tactics
As more people store data in a mobile environment, laptops and portable storage devices have become more attractive to ID thieves, says Bob Egner, a marketing executive at Pointsec Mobile Technologies, which makes security software. [more]
Thursday, 30 March 2006, 3:17 AM CET


DNS hackers target domain registrars
VeriSign and Joker.com hit by DDoSsers. More to follow? [more]
Thursday, 30 March 2006, 2:35 AM CET


How to catch a terrorist without hurting anyone's feelings
An argument for computerized probable cause. [more]
Thursday, 30 March 2006, 2:06 AM CET


New Trojan encrypts data, demands ransom
First adware, then spyware, now ransomware. [more]
Thursday, 30 March 2006, 1:37 AM CET


Barclays denies online confusion
Barclays Bank customers have complained they can no longer set up new payments through the website. [more]
Thursday, 30 March 2006, 1:11 AM CET


McAfee looking to acquire security companies
It would pay cash for tech that can quickly be integrated in current line. [more]
Thursday, 30 March 2006, 12:56 AM CET


Hackers tap banks' web sites in unique phishing attack
In an unusual form of phishing, hackers cracked the computers hosting the Web sites of three Florida banks, redirecting banking customers to a bogus homepage in order to steal account information and other personal data. [more]
Thursday, 30 March 2006, 12:46 AM CET


NSA awards Harris $41.6 milion for secure WLAN
The cryptographic networking gear is expected to be deployed in several DoD-related programs, Harris said. [more]
Wednesday, 29 March 2006, 5:08 PM CET


IRS targets bogus phishing e-mails
Users can send suspicious e-mails purportedly from the IRS to phishing@irs.gov. [more]
Wednesday, 29 March 2006, 4:45 PM CET


Time Warner VP pokes holes in NSA spy program
It is impossible to judge the constitutionality of he National Security Agency's electronic surveillance program without facts about the program, according to Time Warner Senior Vice President David Kris. [more]
Wednesday, 29 March 2006, 4:06 PM CET


German watermark technology gains traction
Legendary Fraunhofer group delivers not one but two standards. [more]
Wednesday, 29 March 2006, 3:40 PM CET


The pathogenesis of dark traffic attacks
As well as straightforward spam, dark traffic comprises directory harvest attacks, email Denial of Service attacks, malformed SMTP packets, invalid recipient addresses, and other requests and communications unrelated to the delivery of valid email messages. [more]
Wednesday, 29 March 2006, 2:53 PM CET


Authorities get on top of spam Down Under
Australia has cracked down on junk mail with an industry code for tackling spam. [more]
Wednesday, 29 March 2006, 2:52 PM CET


Debit-card fraud underscores legal loopholes
Recent widespread debit-card fraud likely has roots in three major data leaks that occurred in the last six months, two of which have yet to be publicly disclosed by the companies involved. [more]
Wednesday, 29 March 2006, 2:37 PM CET


Knoppix Hacks - scan for viruses
idding a network of Windows computers of a virus or worm can seem impossible. [more]
Wednesday, 29 March 2006, 2:11 PM CET


Industrial espionage worm authors jailed
Spy worm turns on its creators. [more]
Wednesday, 29 March 2006, 1:56 PM CET


After IE attacks, Microsoft eyes security betas
Maliciously encoded Web sites spur Microsoft to find a way to provide speedier security updates. [more]
Wednesday, 29 March 2006, 1:29 PM CET


Guide aims to plug security holes for small business
Several groups have come together to help vulnerable small businesses protect against data breaches with a package of guidelines. [more]
Wednesday, 29 March 2006, 1:28 PM CET


Mobiles open backdoor into corporate networks
Your phone's infected, you're not coming in. [more]
Wednesday, 29 March 2006, 1:27 PM CET


The Internet's War of the Roses
In a little-noticed decision, the U.S. Supreme Court ruled last week that when one tenant objects to police searching a house, and the other tenant consents, the police must nonetheless get a warrant. This result suggests that rumors of the Fourth Amendment's demise have been exaggerated.
[more]
Wednesday, 29 March 2006, 1:27 PM CET


Critical Internet Explorer flaw patched by third party
"Browsers are so complex now that there are more bases to cover," said Forrester analyst Paul Stamp. "And because Microsoft went years before taking a proactive approach to Explorer bugs, there will be more flaws cropping up." [more]
Wednesday, 29 March 2006, 2:27 AM CET


Jabber creator launches online identity project
MicroID utility gives authors a way to prove identity of blog postings. [more]
Tuesday, 28 March 2006, 8:38 AM CET


Security woes hamper Microsoft release
In the half-decade it has taken Microsoft Corp. to develop a new version of its Windows computer operating system, Google Inc. has blossomed from a little-watched Internet search engine to emerge as one of Microsoft's biggest threats. [more]
Tuesday, 28 March 2006, 8:21 AM CET


Video - The code room: breaking into Vegas
In this episode of The Code Room watch the White Hats and Black Hats battle for the security of Las Vegas. Jessi Knapp and Microsoft Security Guru Joe Stagner narrate as the Hackers try to gain control of The Plaza's online money management system and our Security Team tries to stay one step ahead. [more]
Tuesday, 28 March 2006, 7:25 AM CET


Test your knowledge of wireless security
How well do you know wireless security? Well enough to sign up for the CWSP (Certified Wireless Security Professional) exam, or one similar to it? [more]
Tuesday, 28 March 2006, 6:31 AM CET


Web, email abuse leads to security breaches
Lax control over Internet use and emails by UK companies is leading to security breaches, with the problem second only to viruses, according to a survey led by PricewaterhouseCoopers. [more]
Tuesday, 28 March 2006, 5:48 AM CET


IBM exec touts mainframe security
Jim Stallings is two months into his job as general manager of IBM's mainframe System z division. In an interview this week with Computerworld's Patrick Thibodeau, Stallings mapped out some of his plans, including security, the training of 20,000 mainframe workers by 2010 and the prospect of new specialty processors. [more]
Tuesday, 28 March 2006, 5:19 AM CET


Guide aims to plug security holes for small business
Program aimed at companies with fewer than 500 employees. [more]
Tuesday, 28 March 2006, 4:54 AM CET


Beware the siren cry of VoIP
Anyone still using an ordinary wire-line phone is a bit behind the times, or are they? [more]
Tuesday, 28 March 2006, 4:23 AM CET


3Com calls for new network security architecture
"There's a lot of intelligence that can be embedded in the network," said Robert Whitely at Forrester Research. [more]
Tuesday, 28 March 2006, 2:49 AM CET


Researcher: DRM technology fails in practice
Cambridge-MIT researcher says business models need changing, not the technology. [more]
Tuesday, 28 March 2006, 2:46 AM CET


Phishers stick the boot into World Cup fans
Security experts have warned internet users to be on their guard against a new phishing and spyware scam targeting 2006 Fifa World Cup enthusiasts. [more]
Tuesday, 28 March 2006, 2:13 AM CET


Spyware and adware continue to plague PCs
The characters who create and distribute spyware eventually reach a crossroads. Some clean up their acts, present themselves as adware aficionados, and do their best to legitimize questionable marketing techniques. [more]
Tuesday, 28 March 2006, 1:59 AM CET


Israeli couple jailed over computer virus
An Israeli couple convicted of inventing a computer virus that set off a major industrial espionage investigation were sentenced to jail on Monday, court documents showed. [more]
Tuesday, 28 March 2006, 1:46 AM CET


Local authority IT project moves to next stage
Government Connect gets new leadership to broaden appeal. [more]
Tuesday, 28 March 2006, 1:26 AM CET


Thefts prompt products that do more to secure laptops
The latest in computer security is a throwback to old-fashioned safety. [more]
Tuesday, 28 March 2006, 12:53 AM CET


IBM readies 'virtual' worm-detection
IBM is planning to launch a new worm-detection solution today that takes the "honeypot" (define) technique of fighting worms to a new level, internetnews.com has learned. [more]
Tuesday, 28 March 2006, 12:41 AM CET


Cybersquatters try new tactics
Cybersquatting the domain name of a celebrity and selling it for a king's ransom was one of the great get-rich-quick schemes of the early internet. But since courts now tend to favor the star over the squatter, a new kinder, gentler cybersquatting tactic has emerged. [more]
Monday, 27 March 2006, 2:31 PM CET


The most prevalent wireless threats
With the prevalence of mobile devices and the increasing use of wireless-aware applications, enterprises need to continually track the threats that they face and take steps to mitigate them. [more]
Monday, 27 March 2006, 2:30 PM CET


S'kiddies get into spyware for just $15
Russian site sells scumware starter pack. [more]
Monday, 27 March 2006, 2:26 PM CET


Domain registrar Joker Hit by DDoS
Domain registrar Joker.com says its nameservers are under attack, causing outages for customers. [more]
Monday, 27 March 2006, 2:24 PM CET


Filter tips for your security solutions
Unified Threat Management (UTM) suites and appliances are increasingly popular with users and with good reason. [more]
Monday, 27 March 2006, 2:23 PM CET


LG points to finger-secure laptops
LG Electronics has decided to give buyers of its latest dual-core laptops an extra level of security by adding AuthenTec fingerprint sensors to its dual-core Express series notebook PCs. [more]
Monday, 27 March 2006, 3:18 AM CET


Setting up a high-availability NFS server
This tutorial describes how to set up a highly available NFS server that can be used as storage solution for other high-availability services like, for example, a cluster of web servers that are being loadbalanced. [more]
Monday, 27 March 2006, 3:07 AM CET


IBM service offers Billy Goat bait to hackers
IBM's Business Consulting Services unit plans to start offering an intrusion detection service that will masquerade as a group of servers on the network in order to trick hackers into revealing information about their attacks. [more]
Monday, 27 March 2006, 2:43 AM CET


Hacked: 33 .nz websites per month
There is a need for intrusion prevention, says secure network vendor. [more]
Monday, 27 March 2006, 2:38 AM CET


NSA might listen to lawyer calls
The National Security Agency could have legally monitored ordinarily confidential communications between doctors and patients or attorneys and their clients, the Justice Department said Friday of its controversial warrantless surveillance program. [more]
Monday, 27 March 2006, 2:26 AM CET


Money lures Net hackers, not glory
Fraud is perhaps the most pervasive danger in online transactions. [more]
Monday, 27 March 2006, 2:07 AM CET


Terrorist 007, exposed
For almost two years, intelligence services around the world tried to uncover the identity of an Internet hacker who had become a key conduit for al-Qaeda. [more]
Monday, 27 March 2006, 1:08 AM CET


Police use MySpace to ID suspects
Detectives used profiles posted on the MySpace social networking website to identify six suspects in a rape and robbery that began when a party turned violent, leaving blood "in almost every room of the house," officials said. [more]
Monday, 27 March 2006, 12:54 AM CET


International body adopts network security standard
The International Organization for Standardization (ISO) approved last month a comprehensive model that identifies critical requirements to ensure end-to-end network security. [more]
Monday, 27 March 2006, 12:36 AM CET


Microsoft security chief to step down
Mike Nash was responsible for setting its overall security strategy as the software vendor struggled against a public perception that its products were insecure. [more]
Monday, 27 March 2006, 12:16 AM CET


Feds nix Check Point's Sourcefire bid
A takeover bid by an Israeli firewall firm has become the latest victim of US security protectionism. Check Point Software has dropped its bid for US rival Sourcefire after objections from the FBI and Pentagon were heard by the Treasury's Committee on Foreign Investments. [more]
Monday, 27 March 2006, 12:12 AM CET


Locking down Exchange Server
Learn about e-mail security essentials you should already have incorporated into your Exchange environment, including documentation, antivirus, patch management, attack surface reduction and the ExBPA tool. [more]
Monday, 27 March 2006, 12:01 AM CET


Engineering firm "white lists" vulnerable apps
When Patton Harris Rust & Associates found out that Microsoft's Windows MetaFile (WMF) had a security vulnerability that might be exploited for zero-day attacks, PHR&A's IT team quickly removed the offending WMF dynamic link library file from its application whitelist. [more]
Friday, 24 March 2006, 12:25 PM CET


Exploit now publicly available for unpatched IE flaw
'It’s just a matter of time before (it) gets turned into a virus or a worm,' says one security expert. [more]
Friday, 24 March 2006, 12:06 PM CET


Compliance and mobility govern security
Megha Banduni examines the trends in the security market, and predicts a bright future for integrated security devices. [more]
Friday, 24 March 2006, 12:05 PM CET


AIM RFID experts refute RFID virus claims
AIM Global, the trade association for automatic identification and mobility, issued a statement today in response to a technical paper delivered during a conference 15 March 2006 in Pisa, Italy, titled "Is Your Cat Infected with a Computer Virus?" The paper claims that RFID tags can be used to corrupt databases and even potentially to spread computer viruses. [more]
Friday, 24 March 2006, 12:04 PM CET


N.Y. sues FreeiPods.com over privacy breach
New York's attorney general sued an internet company Thursday over the selling of e-mail addresses in what authorities say may be the biggest deliberate breach of internet privacy ever. [more]
Friday, 24 March 2006, 12:01 PM CET


Four indicted in Nigerian e-mail scam
Four people have been indicted and could face 30 years in prison for a variation on a popular scam in which e-mail senders claim they're trying to transfer money out of Nigeria, the U.S. Department of Justice announced today. [more]
Friday, 24 March 2006, 12:00 PM CET


Advances in fingerprinting could bolster network security
Study by National Institute of Standards and Technology unites 14 fingerprint technology vendors. [more]
Friday, 24 March 2006, 11:57 AM CET


Laptop theft at Fidelity exposes data on 196,000 HP workers
The laptop held data about participants in an HP-sponsored retirement plan. [more]
Friday, 24 March 2006, 1:30 AM CET


Forgotten password clues create hacker risk
Crackers play battleships with user credentials. [more]
Friday, 24 March 2006, 1:17 AM CET


Mailing lists identify the most security flaws
Red Hat's experience suggests the best ways to keep up to date with security vulnerabilities. [more]
Friday, 24 March 2006, 12:48 AM CET


Attack hits Sun public grid service on day one
The first day that Sun Microsystems Inc. allowed users to buy access over the Internet to its long-delayed public utility grid, a denial of service attack forced the company to take down a service hosted on the grid, the company said today. [more]
Friday, 24 March 2006, 12:40 AM CET


Sendmail flaw poses critical hacker risk
Security researchers have unearthed a flaw in Sendmail, the popular email server package that's widely used by ISPs. [more]
Friday, 24 March 2006, 12:16 AM CET


Four keys to effectively monitor and control secure file transfer
As more information is digitized and considered critical, you're spending far more time managing data. Learn about the four keys to effectively managing and monitoring the flow of this increasing amount of business data. [more]
Friday, 24 March 2006, 12:00 AM CET


Massive botnet pillaging bank accounts
A stealthy bot Trojan has been infecting machines via drive-by-downloads for months, and may have infected a million PCs. It aims to pillage personal bank accounts. [more]
Thursday, 23 March 2006, 2:25 PM CET


How VPNs could help secure VoIP
Using VPNs to encrypt VoIP packets as they pass from site to site. [more]
Thursday, 23 March 2006, 2:23 PM CET


Toward inside-out computer security
Perhaps someday Microsoft's Vista or subsequent OSs will prove sufficiently secure that malware no longer is a threat. But until then, enterprises will have to build network and perimeter security that treats their own PCs as potentially hostile - to deal with the threat from within. [more]
Thursday, 23 March 2006, 2:19 PM CET


Bringing botnets out of the Shadows
Nicholas Albright's first foray into some of the darkest alleys of the Internet came in November 2004, shortly after his father committed suicide. About a month following his father's death, Albright discovered that online criminals had broken into his dad's personal computer and programmed it to serve as part of a worldwide, distributed network for storing pirated software and movies. [more]
Thursday, 23 March 2006, 2:18 PM CET


Internet Explorer bombarded by bugs
Microsoft admits three new vulnerabilities in as many days. [more]
Thursday, 23 March 2006, 2:09 PM CET


'Firefox flaw wrecked my relationship'
Web browser bugs are routinely blamed for creating huge networks of compromised PCs and undermining the safety of ecommerce transactions. Now one woman says a "security bug" in Mozilla led to the break up of her engagement. [more]
Thursday, 23 March 2006, 2:09 PM CET


Bill seals up e-crime loophole
Clause in Fraud Bill aims to criminalise deceiving a machine. [more]
Thursday, 23 March 2006, 2:03 AM CET


From Russia with Rootkit
Yesterday we received an interesting email-worm sample, detected as Gurong.a, that uses rootkit techniques to hide its file, process and launch point in the registry. It is based on the infamous Mydoom code and it is in the wild but currently spreading very slowly. [more]
Thursday, 23 March 2006, 1:33 AM CET


Xboxic interviews 360 firmware hacker
Xboxic met up with Robinsod, one of the 6 hackers that worked for months to perform the hack. [more]
Thursday, 23 March 2006, 12:53 AM CET


Knock Code Technology will open your door without keys
The Israeli company E-lock has developed the first lock technology based on a Knock Code. [more]
Thursday, 23 March 2006, 12:33 AM CET


Report identifies Kazaa, SpyAxe as 'badware'
StopBadware.org releases its first report identifying four programs as badware. [more]
Thursday, 23 March 2006, 12:11 AM CET


Ten tips in 10 minutes: ethically hacking VoIP
Authors of the book "Hacking Wireless Networks for Dummies," Kevin Beaver and Peter T. Davis, will discuss the latest ethical hacking techniques for testing the security of your voice over IP implementations. [more]
Thursday, 23 March 2006, 12:05 AM CET


Microsoft to update IE after bugs found
Microsoft Corp. is readying an update to Internet Explorer (IE) following the recent discovery of two unpatched IE vulnerabilities, including one bug that could allow attackers to seize control of a victim's PC. [more]
Wednesday, 22 March 2006, 1:15 PM CET


Debit card fraud underscores legal loopholes
Consumers have noted a large increase in the amount of debit card fraud since the beginning of 2006, as well as a wide recall of cards by banks and financial institutions. [more]
Wednesday, 22 March 2006, 1:14 PM CET


Encryption for the masses
File and disk encryption needs to be simple and easy if it's going to be used. This article looks at Apple's FileVault and takes a sneak peak at what's coming in Windows Vista. [more]
Wednesday, 22 March 2006, 1:14 PM CET


A wardriving experience - part I: the results
I recently put the geek hat on and took to the road for some war driving. My goal was to capture a good amount of data on wireless networks residing in homes and businesses. [more]
Wednesday, 22 March 2006, 4:37 AM CET


VoIP security at odds with QoS
IT managers should think carefully before implementing VoIP. [more]
Wednesday, 22 March 2006, 4:00 AM CET


Dutch hacker finds serious hole in IE 6
Vulnerability could allow PC to be taken over when user visits malicious Web site. [more]
Wednesday, 22 March 2006, 3:38 AM CET


OS X sudo vs. root: the real story
In Mac OS X, the root account is disabled by default. The first user account created is added to the admin group and that user can use the sudo command to execute other commands as root. The conventional wisdom is that sudo is the most secure way to run root commands, but a closer look reveals a picture that is not so clear. [more]
Wednesday, 22 March 2006, 3:23 AM CET


A first look at InfoCard
In this column, I'll introduce you to a system that I truly hope will be a uniting force for identity on the Web. It's called InfoCard, and it's planned to be available with Windows Vista. [more]
Wednesday, 22 March 2006, 2:03 AM CET


Turning adware into shameware
A D.C.-based non-profit public interest group is kicking off a multipart campaign designed to spotlight companies who pay to advertise their products via software that is often installed without the user's full knowledge or consent. [more]
Wednesday, 22 March 2006, 1:38 AM CET


The practical complexities of adware advertising
A report released by the The Center for Democracy and Technology, “How Advertising Dollars Encourage Nuisance and Harmful Adware and What Can be Done to Reverse the Trend”, outlines the practical complexities of Adware Advertising. [more]
Wednesday, 22 March 2006, 1:17 AM CET


Study: piracy plunders jobs
BSA and IDC see 2 million more Asian jobs if theft reduced by ten percent. [more]
Wednesday, 22 March 2006, 12:58 AM CET


Web site takes exploits private
Citing the nation's laws, the French Security Incident Response Team (FrSIRT) removed collected exploits from its front page last week, but still offers the code to paid subscribers. [more]
Wednesday, 22 March 2006, 12:52 AM CET


Dutch coffee shops introduce fingerprint ID
Some Dutch coffee shops, which sell marijuana in small quantities for personal use, are introducing fingerprinting technology to check the age of customers. [more]
Wednesday, 22 March 2006, 12:29 AM CET


Panel explores roots of spyware, adware
Legal experts, government officials and technology professionals gathered Monday to discuss unwanted software programs that track Internet users' behavior. [more]
Wednesday, 22 March 2006, 12:11 AM CET


Guide to network security
This guide provides an overview of network security, including firewalls, intrusion detection, and virtual private networks, and offers guidelines you can put into place today to protect your company's infrastructure and critical data in the future. [more]
Wednesday, 22 March 2006, 12:02 AM CET


Doubts on anti-terror security
It is impossible to know if a key computer system used by the Immigration Department after the September 11 attacks to stop terrorists entering the country worked properly, an Auditor General's report finds. [more]
Tuesday, 21 March 2006, 3:45 AM CET


Mastering your passwords with Keychain Access
One of the beauties that comes with Mac OS X is the Keychain that helps you manage your authorization needs as it acts as a depository of passwords. [more]
Tuesday, 21 March 2006, 2:55 AM CET


Microsoft launches global antiphishing initiative
GPEI aims to educate consumers, increase prosecutions, and combat phishing using technology. [more]
Tuesday, 21 March 2006, 2:40 AM CET


Forgotten password clues create hacker risk
Security flaws in the "forgotten password" feature of ecommerce websites leave half the UK's online retailers open to attack, according to security consultancy SecureTest. [more]
Tuesday, 21 March 2006, 2:16 AM CET


Encrypt filesystems with EncFS and Loop-AES
Encrypted filesystems may be overkill for family photos or your résumé, but they make sense for network-accessible servers that hold sensitive business documents. [more]
Tuesday, 21 March 2006, 2:02 AM CET


Spam - or a cry for help?
"Missing Person Alert". A lot of users recently received an email with this subject, which included a photograph and a description of a missing US citizen. [more]
Tuesday, 21 March 2006, 1:53 AM CET


Tough week ahead for malware companies
CDT, Stopbadware Coalition set to name advertiser names. [more]
Tuesday, 21 March 2006, 1:36 AM CET


European phishing gangs targeted
Microsoft is launching legal action against 100 phishing gangs based in Europe, the Middle East and Africa. [more]
Tuesday, 21 March 2006, 1:20 AM CET


Building a virtual server
This howto describes the steps to be taken to prepare a server for OpenVZ virtual machines on Debian 3.1 (Sarge) 32Bit Linux. [more]
Tuesday, 21 March 2006, 1:03 AM CET


Scammers attack 'social' news sites
Can unedited sites guarantee accurate reporting? [more]
Tuesday, 21 March 2006, 12:46 AM CET


The high cost of data loss
Sensitive personal data has been misplaced, lost, printed on mailing labels, posted online, and just left around for anyone to see. The situation has become untenable. Here's the ugly truth about how it keeps happening, who's been affected, and what's being done about it. [more]
Tuesday, 21 March 2006, 12:39 AM CET


French lawmakers finalize copyright bill
DRM workarounds oui, P2P business model non in Paris. [more]
Tuesday, 21 March 2006, 12:29 AM CET


It's raining IT security surveys
If it feels like you're getting bombarded with surveys about network security threats, that's because you are. [more]
Tuesday, 21 March 2006, 12:18 AM CET


Belgians implant RFID chip in tooth
Belgian scientists at the Catholic University of Leuven have embedded an RFID chip into a tooth to show how detailed personal information can be stored. [more]
Tuesday, 21 March 2006, 12:08 AM CET


Shielding organizations from today's security challenges
Security challenges facing enterprises are not static. [more]
Tuesday, 21 March 2006, 12:04 AM CET


Smartcard providers poised for national rollouts
Smartcard providers are gearing up for massive rollouts in the next two years in the wake of a federal government review into the introduction of a national identity card. [more]
Monday, 20 March 2006, 4:35 AM CET


Security flaws could cripple missile defense network
The network that stitches together radars, missile launch sites and command control centers for the Missile Defense Agency (MDA) ground-based defense system has such serious security flaws that the agency and its contractor, Boeing, may not be able to prevent misuse of the system, according to a Defense Department Inspector General’s report. [more]
Monday, 20 March 2006, 3:56 AM CET


Countering cyber terrorism
Still using that tired and worn out password to log onto your PC? Is your mother’s maiden name still the main prompt you use to log on and check your credit card statement? Worried that the PIN number you use to access your online banking is the same PIN you’ve given the children to access the Sky Digibox? You should be. The fact is that as individuals, we are not doing enough to guarantee user authentication. And if you think that’s bad, the situation in organisations is even worse. [more]
Monday, 20 March 2006, 3:46 AM CET


Build a secure wireless portal with Linux
There are a number of specialized applications for building wireless portals. The grandmommy of them all is NoCatAuth. [more]
Monday, 20 March 2006, 2:59 AM CET


US terror database includes 200,000 people
When there is a possible match, the screening center verifies the information is accurate and advises what steps to take. In most of the more than 6,000 incidents described by Terrorist Screening Center Director Donna Bucella, officials collected additional information and let the person go. [more]
Monday, 20 March 2006, 2:48 AM CET


Google keeps search data private
A federal judge on Friday ordered Google to give the Bush administration a peek inside its search engine, but rebuffed the government's demand for a list of people's search requests - potentially sensitive information that the company had fought to protect. [more]
Monday, 20 March 2006, 2:27 AM CET


New Spycar software will test antispyware
Spycar will test the effectiveness of antispyware products. [more]
Monday, 20 March 2006, 2:05 AM CET


Taking on the real life Internet 'Sopranos'
"There used to be a perception that the Internet is a safe place to do crime," said Christopher Painter of the U.S. Department of Justice. "Judges now are more in tune with the types of casework cybercrime investigators do. Judges are now paying more attention to stricter sentencing guidelines." [more]
Monday, 20 March 2006, 1:40 AM CET


Useful Firefox security extensions
Mozilla’s Firefox browser claims to provide a safer browsing experience out of the box, but some of the best security features of Firefox are only available as extensions. [more]
Monday, 20 March 2006, 1:18 AM CET


The future of wireless networks
Still, it is possible to identify a few of the trends that are most likely to emerge and get a sense of how future developments will affect consumers as well as I.T. pros. [more]
Monday, 20 March 2006, 12:54 AM CET


ID cards are critical to port security
Congress could make a port security plan "significantly more effective" if it beefed up provisions for port user IDs, overseas cargo inspection and the national coordination of security systems, the former chief of the Los Angeles Port Police said Thursday. [more]
Monday, 20 March 2006, 12:45 AM CET


Apple security update causes browser issues
Apple has published a new version of a security update that the company had issued last Monday. [more]
Monday, 20 March 2006, 12:31 AM CET


Homeland cyber security efforts failing
The DHS has been criticized for its bureaucracy and changeover of leaders and staff. [more]
Monday, 20 March 2006, 12:15 AM CET


Kingston's super secure USB drive
Kingston has introduced the industry's first fully secure USB drive meant for the enterprise environment. [more]
Monday, 20 March 2006, 12:03 AM CET


A more secure front door: ESSO and strong authentication
Read how organizations can achieve strong authentication with ESSO - easily and affordably - to dramatically increase their security levels. [more]
Monday, 20 March 2006, 12:00 AM CET


Revealing the myths about network security
Many people and businesses unknowingly leave their private information readily available to hackers because they subscribe to some common myths about computer and network security. But knowing of the facts will help you to keep your systems secure. Here are some answers to these myths. [more]
Friday, 17 March 2006, 4:33 PM CET


Security tweaks in IE7
While the major new features described above have received a lot of press, I’d like to mention just a few of my favorites among the myriad tweaks we’ve made to existing IE features to improve security. [more]
Friday, 17 March 2006, 3:58 PM CET


Port knocking: a security idea whose time has come
Requiring a "combination" before connecting clients to network services is a good idea - it can't hurt, and it just might help. [more]
Friday, 17 March 2006, 3:38 PM CET


Getting paid for getting hacked
Cyber insurance seems to be an exciting business with a lot of uncertainty compared to other industries with more detailed ROIs, as I feel the information security one is missing a reliable ROSI model. [more]
Friday, 17 March 2006, 3:06 PM CET


Microsoft goes public with its hacker conference
Information from BlueHat event posted online. [more]
Friday, 17 March 2006, 2:38 PM CET


Study highlights flaws in virtual platform security
Virtual-machine-based rootkits could be used to compromise virtual operating systems. [more]
Friday, 17 March 2006, 2:35 PM CET


Subversive SubVirt
The IT security world is in something of an uproar - there's a lot of discussion about a supposedly undetectable rootkit which uses virtual machine technology. [more]
Friday, 17 March 2006, 2:31 PM CET


VeriSign details massive denial-of-service attacks
Hackers used botnets and DNS servers to swamp networks with torrents of data. [more]
Friday, 17 March 2006, 2:28 PM CET


New virus holds your documents hostage
If we needed any more convincing that malware has gone commercial, a new virus making the rounds provides additional evidence. [more]
Friday, 17 March 2006, 2:27 PM CET


Using numbers to fight cybercrime
At Partnerworld, discussion of finding "ways to keep score". [more]
Friday, 17 March 2006, 2:20 PM CET


RFID virus infections unlikely - for now
"As we move toward commoditization, if 1,000 companies buy an RFID tracking system and that system has a flaw in it that could be exploited by a virus small enough to fit on an RFID [tag], it is certainly possible that someone might attack those systems," said Ray Wagner, a research vice president at the Gartner Group. [more]
Friday, 17 March 2006, 2:19 PM CET


French toughen anti-piracy laws
Internet copyright pirates in France will face prison and large fines after French MPs pushed through laws to curb illegal music and film downloads. [more]
Friday, 17 March 2006, 2:15 PM CET


An introduction to Elliptic Curve Cryptography
Elliptic Curve Cryptography (ECC) has been gaining momentum as a replacement for RSA public key cryptography largely based on its efficiency, but also because the US National Security Agency (NSA) included it, while excluding RSA, from its Suite B cryptography recommendations. [more]
Friday, 17 March 2006, 2:11 PM CET


California gang members to be tracked by GPS
California prison officials have begun using Global Positioning System anklets to track known gang members. [more]
Friday, 17 March 2006, 2:10 PM CET


Keylogger trojan hits Brazilian banking sites
Mouse-aware malware expected to spread beyond borders. [more]
Friday, 17 March 2006, 2:05 AM CET


Poor authentication increases risk of identity fraud
Software tools can make problems worse, says consultant. [more]
Friday, 17 March 2006, 1:53 AM CET


War-driving in Germany - CeBIT 2006
Our latest research was undertaken at CeBIT 2006. CeBIT, held in Hannover, Germany, is largest information security trade fair in the world, and we had good reason for choosing it as an arena for research. [more]
Friday, 17 March 2006, 1:42 AM CET


Cybercrime costs biz more than physical crime
Lock up your servers, thar be hackers about. [more]
Friday, 17 March 2006, 1:11 AM CET


Adobe fixes critical Flash vulnerabilities
Attackers could use flaws to take over a system. [more]
Friday, 17 March 2006, 1:02 AM CET


Over 12500 Bluetooth devices scanned
We've been developing a Bluetooth honeypot. An early prototype was given a test run at the CeBIT trade fair during the week.

[more]
Friday, 17 March 2006, 12:31 AM CET


Quiz reveals spyware chicanery
Spyware and adware, how much to you know? Which sites are safe? How you can tell? An online quiz tests your ability to spot sites hosting the malicious stuff. [more]
Friday, 17 March 2006, 12:23 AM CET


Configuring Apache for maximum performance
Apache server performance can be improved by adding additional hardware resources such as RAM, faster CPU etc. [more]
Friday, 17 March 2006, 12:19 AM CET


Securing data transmission on government networks
The federal government's evolving networks create new security concerns. This white paper examines these concerns and cost effective ways to solve these issues. [more]
Friday, 17 March 2006, 12:12 AM CET


CIOs in survey: Still a long way to go on security
Information technology security and privacy remain the top concerns for federal chief information officers, according to a new survey by the Information Technology Association of America. [more]
Friday, 17 March 2006, 12:02 AM CET


Microsoft sues over eBay piracy
Microsoft is suing eight people suspected of hawking counterfeit software on eBay. [more]
Thursday, 16 March 2006, 2:10 PM CET


Virus watches mouse clicks
Computer hackers have developed a way of recording mouse clicks, as well as keystrokes, using a new form of virus. [more]
Thursday, 16 March 2006, 2:10 PM CET


Lost Ernst & Young laptop exposes IBM staff
Ernst & Young has lost another laptop containting the social security numbers and other personal information of its clients' employees. [more]
Thursday, 16 March 2006, 2:08 PM CET


Viruses leap to smart radio tags
Computer viruses could be about to take a giant leap and start spreading via smart barcodes, warn experts. [more]
Thursday, 16 March 2006, 2:03 PM CET


Game ID thefts surpass one million
Company accused of taking no action to halt huge illegal registration. [more]
Thursday, 16 March 2006, 1:54 PM CET


Feds get failing grade in computer security report
The scorecards give failing grades to some of the agencies most critical to the nation's defense, including Fs for the U.S. Department of Defense and the U.S. Department of Homeland Security. [more]
Thursday, 16 March 2006, 1:53 PM CET


'Free iPod' takes privacy toll
The big business of renting, selling and buying personal information about netizens was put on notice this week by New York Attorney General Eliot Spitzer in a high-profile case that exposed shady privacy practices and the dubious value of the once-promising Truste "privacy seal." [more]
Thursday, 16 March 2006, 1:53 PM CET


Poor security blamed for increase in internal fraud
DTI survey reveals insufficient internal security. [more]
Thursday, 16 March 2006, 1:48 PM CET


Spyware-for-hire couple plead guilty
An Israeli couple faces prison after confessing to the development and sale of a spyware Trojan horse that helped private investigators snoop on their clients' business competitors. [more]
Thursday, 16 March 2006, 3:00 AM CET


Hackers cash in on financial sector attacks
But pharmaceuticals is top target for spyware. [more]
Thursday, 16 March 2006, 2:52 AM CET


The lie behind lie detectors
If we can put a man on the moon, why can't we detect when someone is lying? [more]
Thursday, 16 March 2006, 2:32 AM CET


10 best security live CD distros
Darknet provides a good summary of 10 best security live distributions. [more]
Thursday, 16 March 2006, 1:29 AM CET


Government ID Card claims deflated
Biometric data open to abuse, says EU data supervisor. [more]
Thursday, 16 March 2006, 1:08 AM CET


RFID tags are subject to viruses, says study
Researchers have created a proof-of-concept, self-replicating RFID virus. [more]
Thursday, 16 March 2006, 12:41 AM CET


What you need to know about Active Directory Federation Services
Windows Server 2003 R2 debuted without much fanfare, but Microsoft delivered on some long-awaited features and functions, not the least of which is technology for identity federation. [more]
Thursday, 16 March 2006, 12:21 AM CET


A comparison among SSL, IPSec and the emerging class of mobile VPNs
This paper provides an in-depth comparison of SSL, IPSec &Mobile VPN solutions, detailing the advantages and disadvantages of each. [more]
Thursday, 16 March 2006, 12:17 AM CET


Philip Zimmermann releases Zfone, a product that secures VoIP
Zimmermann thinks Zfone is better than the other approaches to secure VoIP, because it achieves security without reliance on a PKI, key certification, trust models, certificate authorities, or key management complexity that bedevils the email encryption world. [more]
Wednesday, 15 March 2006, 10:31 AM CET


Social engineering reloaded
The purpose of this article is to go beyond the basics and explore how social engineering, employed as technology, has evolved over the past few years. A case study of a typical Fortune 1000 company will be discussed, putting emphasis on the importance of education about social engineering for every corporate security program. [more]
Wednesday, 15 March 2006, 10:09 AM CET


Microsoft warns of 'critical' Office security flaw
It said the vulnerability could allow attackers to take control of a computer. [more]
Wednesday, 15 March 2006, 5:46 AM CET


Man charged with hacking into GM database
A former security guard at General Motors Corp.'s Warren technical center is accused of taking employee Social Security numbers and using them to hack into the company's employee vehicle database. [more]
Wednesday, 15 March 2006, 5:27 AM CET


Network design: key to VoIP deployments
Deploying VoIP on a data network with improper quality-of-service parameters may be problem number one, but there are many more, said Richard Zimmerman of Forsythe Solutions Group, most related to expectations and planning problems. Too many enterprises are jumping into IP-based telephony because "the cool kids are doing it." [more]
Wednesday, 15 March 2006, 4:43 AM CET


Cryzip Trojan encrypts data, requests ransom
Ransomware is back. [more]
Wednesday, 15 March 2006, 4:21 AM CET


Apple issues update for 'extremely critical' OS X flaws
The latest patch again addresses an issue in which Safari could automatically open a malicious file crafted to look like a safe file type. The update introduces additional checks to files that are downloaded to verify their identity. [more]
Wednesday, 15 March 2006, 4:10 AM CET


The 7 myths about protecting your web applications
Web applications are currently proving to be one of the most powerful communication and business tool. But they also come with weaknesses and potential risk that network security devices are simply not designed to protect. [more]
Wednesday, 15 March 2006, 4:00 AM CET


Storage security: neglect it at your peril
Hardly a week goes by without some sort of story appearing in the papers about one major financial institution or other losing back-up tapes containing confidential client information. [more]
Wednesday, 15 March 2006, 3:51 AM CET


New FBI management system could cost $500M
That's almost three times the amount spent on the abandoned Virtual Case File program. [more]
Wednesday, 15 March 2006, 3:26 AM CET


The security rundown
IBM-sponsored survey shows e-security weighing heavily on the corporate mind. [more]
Wednesday, 15 March 2006, 3:00 AM CET


US cops collar ATM fraud ring
US police have arrested 14 people suspected of involvement in widespread ATM fraud that has forced a number of US banks to reissue debit and credit cards over recent months. The suspects are all accused of manufacturing counterfeit cards using stolen credit card details. Most of the arrests happened over the last fortnight. [more]
Wednesday, 15 March 2006, 2:07 AM CET


Cyber bullies haunt young online
Bullies are increasingly using the internet to terrorise teenagers outside of school, a survey suggests.
[more]
Wednesday, 15 March 2006, 1:12 AM CET


Phishing fraudsters offer cash reward
Phishing fraudsters offer cash reward [more]
Wednesday, 15 March 2006, 12:51 AM CET


France chews Apple over proprietary downloads
New law would make DRM hacking legal. [more]
Wednesday, 15 March 2006, 12:34 AM CET


Video: SQL server data encryption
SQL Server 2005 includes some new encryption capabilities that all administrators, programmers and database analyst should be aware of.

[more]
Wednesday, 15 March 2006, 12:09 AM CET


Secure information exchange in an insecure world
Managing email and data security has become increasingly important with the enforcement of compliance audits and the growing number of security threats. Learn the current file delivery solutions and how their deficiencies can be addressed. [more]
Wednesday, 15 March 2006, 12:05 AM CET


Socially engineered breach highlights security weakness
Free CDs likely skirted an array of IT security systems in place to prevent malicious code from being installed. [more]
Tuesday, 14 March 2006, 2:02 PM CET


Passport data checks go live
Scheme the basis for ID Cards? [more]
Tuesday, 14 March 2006, 2:01 PM CET


Hackers stole 1 million IDs for online game
The popular online game Lineage has led to the online theft of no fewer than 1 million identities, a police investigation has revealed. [more]
Tuesday, 14 March 2006, 2:00 PM CET


How to legislate against hackers
Everyone is in favour of sending hackers to prison for longer, but technology commentator Bill Thompson wonders if our MPs are competent to make good cyber-laws. [more]
Tuesday, 14 March 2006, 1:59 PM CET


Fraud falling under Chip and PIN
Chip and PIN technology has helped cut credit card fraud by 13 per cent in the last year, its first decline in a decade, according to new figures. [more]
Tuesday, 14 March 2006, 1:57 PM CET


Human rights and wrongs online
A government's position on censorship used to protect its citizenry is dictated by who they are. The well-popularized censorship of Internet content in China by Google and other big players, and criticism of this by the U.S. government, is really just the tip of the iceburg. [more]
Tuesday, 14 March 2006, 1:56 PM CET


Spam king sets up in New Zealand?
Brendan Battles says he's not THAT Brendan Battles. [more]
Tuesday, 14 March 2006, 3:06 AM CET


Hacked bank server hosts phishing sites
Criminals appear to have hacked a Chinese bank's server and are using it to host phishing sites to steal personal data from customers of eBay Inc. and a major U.S. bank., according to Internet services company Netcraft. [more]
Tuesday, 14 March 2006, 2:56 AM CET


ID management a 'human problem,' says privacy group
A word of advice: "Be very afraid of your most helpful staff". [more]
Tuesday, 14 March 2006, 2:28 AM CET


Ubuntu releases bug fix
Hole in Linux OS could reveal sensitive information. [more]
Tuesday, 14 March 2006, 2:19 AM CET


CeBIT: Tech companies focus on security
Security is never far off the mind of most people, and the companies that make money from fear are here in abundance at the CeBIT technology trade fair. [more]
Tuesday, 14 March 2006, 1:41 AM CET


Got wireless security?
GetNetWise and Symantec team up to offer a wireless security primer. [more]
Tuesday, 14 March 2006, 1:17 AM CET


China encryption system rejected, reports say
The world industrial-standards association has rejected China's controversial wireless encryption standard for global use, news reports said Monday, dealing a blow to Beijing's effort to promote its own standards for computers and telecoms. [more]
Tuesday, 14 March 2006, 12:35 AM CET


Security hole found in crypto program GPG
Attackers could sneak malicious code into e-mails. [more]
Tuesday, 14 March 2006, 12:32 AM CET


Email marketing firm settles data mining lawsuit
Email marketing firm Datran Media has agreed to reform its business practices after paying $1.1m to settle a lawsuit that alleged it used personal data and email addresses gathered from other companies to mount junk mail campaigns. [more]
Tuesday, 14 March 2006, 12:12 AM CET


Best practices for protecting IP-based storage
Are you looking at ways to protect sensitive customer data on your storage network? Read this white paper to learn how to solve this critical business issue. [more]
Tuesday, 14 March 2006, 12:01 AM CET


WPA2 security now mandatory for Wi-Fi certified products
Nearly 600 products have been Wi-Fi CERTIFIED for WPA2 since it was introduced as an optional program in September 2004, building on the existing WPA program. [more]
Monday, 13 March 2006, 7:39 PM CET


Encrypting stored data is easy...
...but keeping track of the decryption keys is much trickier. [more]
Monday, 13 March 2006, 5:00 PM CET


Implementing IPsec on OpenBSD
This IPv4-centric document is meant both as an overview to the IP Security Protocol (IPsec) and as an introduction to OpenBSD's implementation of it. [more]
Monday, 13 March 2006, 4:55 PM CET


Europe signals broader RFID strategy
The main difference between the U.S. and Europe on the matter of RFID and privacy is that European law already governs what information can or cannot be collected on individuals, Electronic Privacy Information Center (EPIC) Director of the International Privacy Project Cedric Laurant told TechNewsWorld. [more]
Monday, 13 March 2006, 4:54 PM CET


Kids learn about cyber security
A group of students at Rome Catholic School are learning how to become the future defenders of cyberspace through a pilot program that officials say is the first of its kind in the country. [more]
Monday, 13 March 2006, 4:53 PM CET


Internet could blow cover of CIA's top operations
Now the agency must fix the holes in an age of too much information. [more]
Monday, 13 March 2006, 4:52 PM CET


More on Mac security
Some advice after a handful of mostly harmless worms shows that Macs are vulnerable to attack. [more]
Monday, 13 March 2006, 2:49 PM CET


Virtual rootkits create stealth risk
MS researchers grapple with phantom malware. [more]
Monday, 13 March 2006, 2:44 PM CET


Single Windows security patch for March
One update rated 'important'. [more]
Monday, 13 March 2006, 2:43 PM CET


The Pirate Bay: here to stay?
"All of us who run the TPB are against the copyright laws and want them to change," said "Brokep," a Pirate Bay operator. "We see it as our duty to spread culture and media. Technology is just a means to doing that." [more]
Monday, 13 March 2006, 2:41 PM CET


Sun grid national security threat overstated
If one were to believe the recent press regarding the U.S. Department of State's role in delaying Sun Microsystems' launch of its Sun Grid utility, it could be concluded that unchecked access to the grid's resources would constitute a grave and serious threat to national security. [more]
Monday, 13 March 2006, 2:40 PM CET


Enterprise-grade wireless LAN security
This white paper outlines the considerations that should be taken into account to ensure the deployment of a secure wireless network. [more]
Monday, 13 March 2006, 2:38 PM CET


Adult payment firm denies customer records breach
An online payments firm that specialises in processing payments to porn sites has denied that a supposed haul of consumer data originated from its databases. [more]
Friday, 10 March 2006, 5:11 PM CET


Seagate and Secude partner on encrypted laptop
Seagate drive automatically encrypts data with minimal effect on performance. [more]
Friday, 10 March 2006, 4:51 PM CET


Weekly report on viruses and intruders - Saros.C worm and ComWar.M hostile mobile code
This week's report from Panda Software on the malicious code that has attracted most attention during the week focuses on three radically different examples of malware. One is a Trojan and the other two are worms, although with markedly different characteristics. [more]
Friday, 10 March 2006, 4:32 PM CET


CeBIT - conference patrons say security needs simplicity
Businesses seek simple, fast deployment through organizations. [more]
Friday, 10 March 2006, 3:21 PM CET


Microsoft plans two patches next week
A critical fix for Microsoft Office is on the calendar, as is a separate patch for Windows. [more]
Friday, 10 March 2006, 3:11 PM CET


Sourcefire officials hopeful over sale
Executives of Sourcefire Inc., the Columbia company whose sale to an Israeli firm has been delayed pending a national security review, said yesterday that they believe the concerns surrounding the deal can be resolved. [more]
Friday, 10 March 2006, 3:06 PM CET


Microsoft patches trip up Windows Media Player
Recent security fixes may cause performance problems. [more]
Friday, 10 March 2006, 3:02 PM CET


Does Apple need a security czar?
Creating a CSO position may be viewed by some as an admission of weakness. [more]
Friday, 10 March 2006, 2:37 PM CET


10 of the best for security
It must have taken vast amounts of self-discipline to avoid radiating smugness: When American Water was infected by the Sasser worm last year its exposure was limited to just 19 hosts out of a potential 10,000, thanks to early detection and active intervention. During the same period, a sister company suffered 4000 infected machines - virtually its entire infrastructure. [more]
Friday, 10 March 2006, 2:18 PM CET


Virus names likely a lost cause
In early February, antivirus firms warned customers about a computer virus programmed to delete files on the third of each month, but almost every company called the program by a different name. [more]
Friday, 10 March 2006, 1:54 PM CET


Think tank forum: Net neutrality equals property theft
Progress and Freedom Foundation criticized net neutrality bills, which would prohibit broadband providers from blocking or slowing services to competing services such as VOIP. [more]
Friday, 10 March 2006, 12:53 PM CET


European Commission to launch public inquiry into RFID
New legislation may be required to regulate the widespread use of radio frequency identification tags, the European Commission said Thursday, announcing the beginning of a public inquiry to identify citizens' concerns about the technology. [more]
Friday, 10 March 2006, 12:52 PM CET


Shadowboxing with a bot herder
Security Fix had an interesting online conversation Tuesday night with a hacker who controls a vast, distributed network of hacked Microsoft Windows computers, also known as a "botnet." [more]
Friday, 10 March 2006, 12:50 PM CET


19 ways to build physical security into a data centre
Protecting data is not just a job for technologists. It also takes physical security and business continuity experts. [more]
Friday, 10 March 2006, 12:49 PM CET


Is Wi-Fi security backward-compatible?
Amid the alphabet soup of what is 802.11-standard security, how do you merge support for a mix of client devices that support the range of Wi-Fi security protocols? [more]
Friday, 10 March 2006, 12:48 PM CET


Hackers targeting Mambo security holes
Hackers are actively seeking out unpatched versions of the Mambo content management system, which recently repaired a serious security hole. [more]
Friday, 10 March 2006, 12:42 PM CET


Secure mobility
Network defense has to evolve beyond protective firewalls and desktop and application level software to security that’s embedded deep within the network at the service provider or carrier level. [more]
Friday, 10 March 2006, 12:41 PM CET


Taxing times ahead as spam soars
Huge rise in 'tax planning offers' as financial year-end nears. [more]
Friday, 10 March 2006, 1:30 AM CET


Intel beefs up desktop security
The processor giant is building stronger protection and better manageability into its desktop technology. [more]
Friday, 10 March 2006, 1:03 AM CET


Siemens offers cordless encryption phone
Siemens phone ensures maximum security and accelerated encryption process. [more]
Friday, 10 March 2006, 12:34 AM CET


UK supermarket trials fingerprint payment tech
A UK supermarket chain is offering shoppers the option of authorising payment for their groceries using their fingerprints. [more]
Friday, 10 March 2006, 12:27 AM CET


Implementing a Postfix mail server with spam and antivirus protection
Building a complete email system with spam and antivirus protection is not as hard as you might think. [more]
Friday, 10 March 2006, 12:15 AM CET


IT security issues pose major risk for e-healthcare
There is increasing concern that e-health records, when linked to any computer network, can be as vulnerable as PCs are to attack from Internet predators. Shouldn't the industry devise security measures that can protect that kind of sensitive data, before doctors start making it readily available over shared databases and networks? [more]
Friday, 10 March 2006, 12:09 AM CET


Why enterprise data activity auditing has become a necessity
In this presentation, Noel Yuhanna provides an overview of trends and drivers related to data security. [more]
Friday, 10 March 2006, 12:04 AM CET


Interview with Marc Shinbrood, President and CEO, Breach Security
In this Q&A Mr. Shinbrood discusses online security threats, the Web 2.0 phenomenon and its security ramifications, the challenge of protecting information at the enterprise level, and more. [more]
Thursday, 9 March 2006, 2:42 PM CET


Citibank reissues cards after fraudulent withdrawals
ATM crooks target bank. [more]
Thursday, 9 March 2006, 2:06 PM CET


Why data mining won't stop terror
In the post-9/11 world, there's much focus on connecting the dots. [more]
Thursday, 9 March 2006, 2:00 PM CET


For security, Fujitsu talks to the hand
Second-generation biometric device scans for vein patterns in the palm. [more]
Thursday, 9 March 2006, 2:00 PM CET


Zombie PCs menace mankind
Cybercrooks are developing more sophisticated techniques to steal confidential data. [more]
Thursday, 9 March 2006, 1:58 PM CET


Denial-of-service hacking soars
Denial-of-service (DoS) attacks, where hackers overload networks with data in an effort to disable them, have risen 50%, a security report says. [more]
Thursday, 9 March 2006, 1:56 PM CET


Mergers put focus on police IT
But plans to restructure forces must not delay any national schemes. [more]
Thursday, 9 March 2006, 1:50 AM CET


Analyzing the crossover virus: the first PC to Windows handheld cross-infector
"Airborne" mobile viruses have been increasing in complexity at a surprising pace. [more]
Thursday, 9 March 2006, 1:37 AM CET


Infopath hit with first virus, F-Secure says
Trojan horse proof of concept virus doing little harm so far. [more]
Thursday, 9 March 2006, 1:34 AM CET


Gov't CIO survey: IT security is top concern
CIOs want tools that perform security monitoring for them, says US survey. [more]
Thursday, 9 March 2006, 1:08 AM CET


Sun Microsystems' N1400V switch
Redundant redundancy provides an extra layer of assurance for network administrators. [more]
Thursday, 9 March 2006, 12:30 AM CET


Physical security used more on IP networks
IT directors are increasingly looking to install physical security such as biometrics and card readers to protect their IP networks. [more]
Thursday, 9 March 2006, 12:16 AM CET


Biometrics and web tests for immigrants
Home secretary Charles Clarke has unveiled plans to capture biometric data and conduct e-assessments of migrant workers. [more]
Thursday, 9 March 2006, 12:03 AM CET


Master critical firewall security
Attend a powerful online IS security webcast from Villanova University to gain a better understanding of critical network security issues - like firewalls, and the impact they have in today's security-conscious business environment. [more]
Thursday, 9 March 2006, 12:00 AM CET


Phishing fraudsters aim to outpace site shutdowns
Cybercrooks have developed new techniques in response to increasingly aggressive moves to identify and shut down known phishing sites. In a move designed to ensure potential phishing victims always link to a live website, fraudsters have developed so-called "smart redirection" attacks. [more]
Wednesday, 8 March 2006, 1:36 PM CET


Experts welcome UK security training body
Gartner gives a cautious welcome to the Institute of Information Security Professionals. [more]
Wednesday, 8 March 2006, 1:36 PM CET


Apple OS X withstands hacking contest
The University of Wisconsin has ended its OS X hacking contest with no successful hacking attempts. [more]
Wednesday, 8 March 2006, 1:33 PM CET


Quick overview of object access auditing in Windows
A lot of people are unhappy with object access auditing on Windows, because what they want to know is "who touched the object and what did that person do", but what Windows auditing tells you is actually "who touched the object and what did they ask for permission to do". [more]
Wednesday, 8 March 2006, 10:17 AM CET


Black market thrives on vulnerability trading
Security giant Symantec claims that anonymous collusion between hackers and criminals is creating a thriving black market for vulnerability trading. [more]
Wednesday, 8 March 2006, 10:16 AM CET


IT security top concern for fed CIOs
Chiefs want more mature IT security tools. [more]
Wednesday, 8 March 2006, 10:14 AM CET


The best privacy consultancies
Like curling is to the Winter Olympics, privacy is to the consulting business: a curious oddity slotted in where it's least disruptive. That is, until recently. [more]
Wednesday, 8 March 2006, 10:13 AM CET


System Administration with ooRexx
Do you support Windows servers? In any environment where many hands touch the servers, you'll nearly always find wasted space. [more]
Wednesday, 8 March 2006, 10:12 AM CET


Top 50 malicious code samples reveals secrets
Symantec’s latest Internet Security Threat Report found an increase in threats designed to facilitate cyber crime. [more]
Wednesday, 8 March 2006, 10:11 AM CET


After flap, Symantec adjusts browser bug count
Depending on how you count flaws, either IE or Firefox could be considered less secure. [more]
Wednesday, 8 March 2006, 2:45 AM CET


RFID systems bolster integration
Sun, IBM, Symbol and Microsoft all unveiled initiatives at the RFID World event last week. [more]
Wednesday, 8 March 2006, 2:27 AM CET


The value of vulnerabilities
There is value in finding vulnerabilities. Yet many people believe that a vulnerability doesn't exist until it is disclosed to the public. We know that vulnerabilities need to be disclosed, but what role do vendors have to make these issues public? [more]
Wednesday, 8 March 2006, 2:23 AM CET


Computer hacking laws discussed in Parliament
The House of Commons heard the first reading of The Police and Justice Bill yesterday which, if approved, could lead to tougher prison sentences for computer hackers and virus writers. [more]
Wednesday, 8 March 2006, 2:21 AM CET


Symantec begins wireless security initiative
Symantec and the Internet Education Foundation launched a consumer wireless education effort Tuesday initially aimed at the country's 56 million wireless Internet users. [more]
Wednesday, 8 March 2006, 2:11 AM CET


Where's my 0day, please?
I recently came across to a site selling 0day vulnerabilities which now appears to be down. However, I took some screenshots and posted more comments on the market for software vulnerabilities, worth checking out. Find out more about The International Exploits shop. [more]
Wednesday, 8 March 2006, 2:06 AM CET


Smartcard-enabled security solutions
Smart card-enabled solutions provide a solid foundation for securing information and communications in the enterprise. They secure access to PCs and applications, buildings and rooms. [more]
Wednesday, 8 March 2006, 2:03 AM CET


Combating identity theft
Identity theft is the major security concern facing organisations today. Indeed, for the banking industry, it is the number one security priority for 2006. In a recent survey of security budget holders and influencers of UK banks, 73% of respondents cited identity management as the top transaction security concern. [more]
Tuesday, 7 March 2006, 9:00 PM CET


The future of privacy
Over the past 20 years, there's been a sea change in the battle for personal privacy. [more]
Tuesday, 7 March 2006, 4:14 PM CET


Are spam blockers too strict?
America Online's controversial plan to charge mass e-mailers a fee to bypass their anti-spam system highlights the other, lesser-known, horn of the junk-e-mail problem: Filters that allegedly work too well. [more]
Tuesday, 7 March 2006, 4:09 PM CET


China malware increasing, Symantec says
The malware coming from China rose 153 percent in the last six months of 2005. [more]
Tuesday, 7 March 2006, 4:05 PM CET


The perfect Linux firewall part II– IPCop & Copfilter
This document is the second segment in a series on installing IPCop firewall. [more]
Tuesday, 7 March 2006, 4:03 PM CET


Citibank issues ATM fraud statement
An entry on the popular blogger website Boing Boing recently suggested Citibank may be battling a new ATM fraud issue, according to one report by a Citibank customer. [more]
Tuesday, 7 March 2006, 4:02 PM CET


Researcher hacks Microsoft Fingerprint Reader
But cracking into PC with captured fingerprint image would not be easy. [more]
Tuesday, 7 March 2006, 3:56 PM CET


Microsoft cryptographer denies Vista back door
A senior cryptographer working for Microsoft has vehemently denied that the firm is planning to compromise the encryption functionality incorporated in its forthcoming Vista operating system by adding a backdoor. [more]
Tuesday, 7 March 2006, 3:53 PM CET


Security in the spotlight at Cebit
Vendors will show security products for handhelds, VoIP, networks and even paper. [more]
Tuesday, 7 March 2006, 3:53 PM CET


Tougher hacking laws get support
Both the Tories and Lib Dems have backed government measures to increase penalties for UK computer hackers. [more]
Tuesday, 7 March 2006, 3:52 PM CET


Couple face jail for Trojan trickery
A couple accused of corporate espionage using Trojan software have been indicted in a Tel Aviv court. [more]
Tuesday, 7 March 2006, 3:51 PM CET


Cisco captures video surveillance firm
Networking giant Cisco has agreed to acquire video surveillance firm SyPixx Networks for $51m in cash and stock. SyPixx markets hardware and software technology that allows analogue video surveillance systems to plug into IP networks. [more]
Tuesday, 7 March 2006, 3:50 PM CET


Securely deleting files with shred
I used to think a simple format of a hard drive was enough to make data recovery impossible, but I was wrong. [more]
Tuesday, 7 March 2006, 1:18 AM CET


How IT security pay stacks up around the globe
U.S. security professionals tend to be paid more than their foreign counterparts. [more]
Tuesday, 7 March 2006, 12:36 AM CET


Will security ever "get done?"
Here is a fun thing to think about: with security, will we ever really be “done”? [more]
Monday, 6 March 2006, 10:36 AM CET


Oracle security under scrutiny
As the number of vulnerabilities in its products grows, Oracle is on the defensive. [more]
Monday, 6 March 2006, 10:33 AM CET


The role of architectural risk analysis in software security
Design flaws account for 50% of security problems. You can’t find design defects by staring at code—a higher-level understanding is required. That’s why architectural risk analysis plays an essential role in any solid software security program. Find out more about architectural risk analysis in this sample chapter. [more]
Monday, 6 March 2006, 10:18 AM CET


Microsoft security exec promises a safer Vista
Microsoft Corp.'s business customers in Europe will get plenty of assistance to migrate from their current versions of Windows to Windows Vista when that operating system ships in the second half of 2006, according to Detlef Eckert, chief security advisor for Microsoft in Europe, the Middle East and Africa (EMEA). [more]
Monday, 6 March 2006, 10:17 AM CET


6 tips for shopping safely online
Done right, purchasing over the Web can be as safe as a store. Done wrong, you risk your money and your identity. Here’s how to get it right. [more]
Monday, 6 March 2006, 1:09 AM CET


Better networking with SCTP
The Stream Control Transmission Protocol combines advantages from both TCP and UDP. [more]
Monday, 6 March 2006, 1:07 AM CET


Customers voice concern over IP telephony security
Security fears are the biggest concern of internet protocol (IP) telephony customers worldwide, according to a senior Alcatel executive. [more]
Monday, 6 March 2006, 12:54 AM CET


Stealing wireless access becomes more frequent
Many who piggyback say the practice does not feel like theft because it does not seem to take anything away from anyone. One occasional piggybacker recently compared it to "reading the newspaper over someone's shoulder."
[more]
Monday, 6 March 2006, 12:47 AM CET


Breach notification: when should companies tell all?
While there appears to be growing industry consensus that security breach notification laws have forced companies to take more responsibility for the data they own, there is little agreement on exactly when companies should be required to notify consumers when a data breach occurs. [more]
Monday, 6 March 2006, 12:39 AM CET


Stolen laptop has student IDs
Credit at risk for thousands who took Metro State classes. [more]
Monday, 6 March 2006, 12:34 AM CET


U-Boat's Enigma cracked with PCs
Sixty years after the end of World War II, a network of several thousand PCs has cracked a message enciphered with the famous Enigma machine. [more]
Monday, 6 March 2006, 12:28 AM CET


Antivirus groups fight over Crossover sharing
A virus that spreads from PCs to mobile devices has become the focus of a power play between the antivirus industry and the relatively young Mobile Antivirus Research Association, which obtained the only sample of the program. [more]
Monday, 6 March 2006, 12:22 AM CET


Crunch year for mobile viruses?
The news this week that mobile phone users are facing the first virus that doesn't just attack smartphones, but most Java phones, means that mobile owners now have to take the threat of mobile viruses seriously. [more]
Monday, 6 March 2006, 12:12 AM CET


Student hacks his grade, gets removed from university
Crime just doesn't pay. [more]
Monday, 6 March 2006, 12:03 AM CET


Centralized command-and-control and system monitoring
Agent-based and agentless server management can augment each other, this paper provides a brief look at some of the major differences between agent-based and agentless server management implementations and how they compliment each other. [more]
Monday, 6 March 2006, 12:01 AM CET


Communicating with confidence: choosing a secure, flexible working solution
Along with the benefits of networked systems – easy information sharing and the ability to work wherever and whenever – comes responsibility. Professionals in all industries have the responsibility to protect their customers’ (and their own) confidentiality. When professionals access their office networks and exchange information with other organisations, confidentiality is paramount, though not always easy to achieve. [more]
Friday, 3 March 2006, 9:26 AM CET


House vote - last bar to USA Patriot Act renewal
On or before March 10, President Bush is expected to renew the law that broadens the power of the U.S. government to obtain private records and to conduct wiretaps and searches, despite the deep bipartisan misgivings of some in Congress. [more]
Friday, 3 March 2006, 9:08 AM CET


Fedex Kinko’s smart cards hacked
The ExpressPay stored-value card system used by FedEx Kinko’s is vulnerable to attack. [more]
Friday, 3 March 2006, 8:08 AM CET


India becomes spam target
Malware writers are starting to target regions with growing numbers of new Internet users in a belief that computer users in those areas are less likely to protect themselves from spam and viruses, according to MessageLabs Ltd. [more]
Friday, 3 March 2006, 8:04 AM CET


Password security: what users know and what they actually do
Password protected accounts are very common and widely used for a variety of online applications including instant messaging, personal and business e-mail, and online banking and retail purchasing accounts. [more]
Friday, 3 March 2006, 8:04 AM CET


Malware-speak spooks Symantec
Symantec said Wednesday it plans to tweak the behavior of its Norton Internet Security and Norton Personal Firewall products so that they are no longer vulnerable to an annoying but otherwise harmless prank that "script kiddie" hackers have been using for the past week or so to knock users off online chat channels. [more]
Friday, 3 March 2006, 8:03 AM CET


U.S. officials investigating Sourcefire purchase
The Associated Press is reporting that Check Point is facing a full-blown investigation over its plans to purchase open-source rival Sourcefire, makers of the widely popular Snort intrusion detection system. [more]
Friday, 3 March 2006, 8:00 AM CET


How to punch through spam filters
Tips for making sure your legitimate bulk e-mail gets through to its recipients, and doesn't end up in the garbage. [more]
Friday, 3 March 2006, 7:55 AM CET


IRS slips on keeping workers’ computers secure
System administrators are being blamed for weak security settings. [more]
Friday, 3 March 2006, 7:45 AM CET


Social Security numbers found on state websites
The disclosure of Ohio residents' Social Security numbers on the state government's website highlights what many privacy experts — and criminals — already know: Such information is readily available to anyone with an Internet connection. [more]
Friday, 3 March 2006, 7:42 AM CET


Making security a shared responsibility
As enterprise IT executives embrace the concepts of open, logical, Web-based computing, they also must rethink their security best practices. [more]
Friday, 3 March 2006, 7:41 AM CET


The advantages of identity based encryption
Enterprises are becoming interested in easy-to-use email encryption, as privacy and data protection regulations apply to organizations across a wide variety of industries. Read this whitepaper to learn about the advantages of identity-based encryption. [more]
Friday, 3 March 2006, 7:40 AM CET


Police cameras spark privacy debate
Testing of Chicago's new speed surveillance SUVs began recently, just as the Illinois State Police debuted their own anti-speeding plan based on high-resolution cameras. The cameras enhance the productivity of troopers who are writing tickets by 16 times, the State Police said. [more]
Thursday, 2 March 2006, 4:43 PM CET


Teenager claims to find code flaw in Gmail
Supposed flaw may already have been fixed. [more]
Thursday, 2 March 2006, 4:43 PM CET


Identity theft victims to sue NCsoft
Online games giant faces potential $230m lawsuit. [more]
Thursday, 2 March 2006, 12:26 PM CET


Top ten viruses and hoaxes reported in February 2006
The report reveals that a Trojan horse, Clagger-G, has infiltrated the chart this month, demonstrating that today's financially motivated threats use a combination of malware and spam technology. [more]
Thursday, 2 March 2006, 11:54 AM CET


Vendor waited six weeks to notify Ohio officials of data breach
A laptop with data on 4,600 state workers and dependents was stolen in December. [more]
Thursday, 2 March 2006, 10:44 AM CET


Apple OS X update plugs 20 security holes
Apple released security update 2006-001 that patches twenty security holes in Mac OS X and bundled applications. [more]
Thursday, 2 March 2006, 10:31 AM CET


RFID: sign of the (end) times?
Katherine Albrecht is on a mission from God. The influential consumer advocate has written a new book warning her fellow Christians that radio frequency identification may evolve to become the "mark of the beast" -- meaning the technology is a sign that the end-times are drawing near. [more]
Thursday, 2 March 2006, 10:26 AM CET


UK parents to get online check of 8m child workers records
Monumental security and privacy disaster ahoy... [more]
Thursday, 2 March 2006, 12:50 AM CET


The big DRM mistake
Digital Rights Managements hurts paying customers, destroys Fair Use rights, renders customers' investments worthless, and can always be defeated. Why are consumers and publishers being forced to use DRM? [more]
Thursday, 2 March 2006, 12:37 AM CET


Mystery surrounds PC-to-mobile virus
Antivirus group said to be demanding membership before code share. [more]
Thursday, 2 March 2006, 12:18 AM CET


Sting nets two spam scam suspects
The US secret service has arrested two men over accusations that they sent massive quantities of spam emails to more than 1.2m AOL subscribers. [more]
Thursday, 2 March 2006, 12:12 AM CET


Racing body cuts internet misuse
Security system helps GRA protect network bandwidth. [more]
Thursday, 2 March 2006, 12:05 AM CET


Has your network management approach kept up with your network?
On average, the network causes 15% of all problems, only 2% are caused by actual networking hardware failures: The other 13% are due to different issues like human error, mis-configurations, routing failures, etc. [more]
Thursday, 2 March 2006, 12:02 AM CET


AOL sues mystery phishers for $18m
AOL filed three civil lawsuits against several major phishing gangs on Tuesday as part of the ISP's wider fight against identity theft scams and other internet security threats. [more]
Wednesday, 1 March 2006, 5:26 PM CET


Men plead guilty over web piracy
Four men have pleaded guilty to being part of a ring that distributed illegal copies of music on the internet. [more]
Wednesday, 1 March 2006, 4:20 PM CET


Opposition to AOL's 'email tax' grows
AOL annoys gun owners, greens, farm unions...almost everyone... [more]
Wednesday, 1 March 2006, 4:17 PM CET


British business picks up on patching
But still slow on antivirus signatures, finds DTI survey. [more]
Wednesday, 1 March 2006, 4:14 PM CET


AOL sues three phishing organizations
AOL has filed three civil lawsuits against major phishing "gangs," seeking $18 million from the groups, the company said Tuesday. [more]
Wednesday, 1 March 2006, 11:21 AM CET


Review: 802.1X authentication servers
Affordable WLAN authentication is out there. We evaluate the market and test four port-based servers and services. [more]
Wednesday, 1 March 2006, 11:19 AM CET


Four lose jobs after data breach at Oregon health care facility
Providence Home Services says it has new data integrity procedures in place. [more]
Wednesday, 1 March 2006, 11:18 AM CET


Clagger Trojan sparks AV industry war of words
Handbags at dawn over new malware. [more]
Wednesday, 1 March 2006, 1:50 AM CET


Zero to IPSec in 4 minutes
This short article looks at how to get a fully functional IPSec VPN up and running between two fresh OpenBSD installations in about four minutes flat. [more]
Wednesday, 1 March 2006, 1:49 AM CET


System administrators toolkit: process administration tricks
Discover how to get the information you want on UNIX processes. [more]
Wednesday, 1 March 2006, 12:12 AM CET


Analyst criticizes security vendors for exploiting Apple flaws
It's no coincidence that not long after security vendors began beating the drum about possible exploits of the Mac OS X operating system, unpatched flaws were uncovered, an analyst suggested Monday. [more]
Wednesday, 1 March 2006, 12:08 AM CET


How to solve six common network problems
This on-demand webcast describes how to solve six common network problems which include issues such as remote office application performance, SNMP security risks, excessive broadcasts from infected devices, and server communication. [more]
Wednesday, 1 March 2006, 12:04 AM CET


Spotlight

Almost 1 in 10 Android apps are now malware

Posted on 28 July 2014.  |  Cheetah Mobile Threat Research Labs analyzed trends in mobile viruses for Q1 and Q2 of 2014. Pulling 24.4 million sample files they found that 2.2 million files had viruses. This is a 153% increase from the number of infected files in 2013.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Jul 29th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //