Off the Wire

Off The Wire Archive

News items for May 2005

Infrared meets speed and security needs
Bluetooth and its ilk may be making the news, but there is an alternative, and in the battle for wireless networks the short-range option may prove to be the victor. [more]
Tuesday, 31 May 2005, 9:08 AM CET


Mideast increasingly at risk from cyber-crime
Almost halfway through 2005 and it already seems as though this year will far surpass 2004 as the worst year on record for global cyber-crime. [more]
Tuesday, 31 May 2005, 9:05 AM CET


Hardware security scheme works at Net infrastructure
Two small networking companies are collaborating on a new concept for network security. [more]
Tuesday, 31 May 2005, 3:59 AM CET


IBM unveils new privacy technology
DB2 Anonymous Resolution enables selected data sharing. [more]
Tuesday, 31 May 2005, 3:40 AM CET


Finding security in a wireless world
As WLANs continue to rapidly proliferate, the technology is scarcely discussed without mention of security concerns. [more]
Tuesday, 31 May 2005, 2:17 AM CET


DHS falls short on cyberduties
The Department of Homeland Security has failed to fulfill the cybersecurity responsibilities it has been assigned since its creation in January 2003, according to a government report released last week. [more]
Tuesday, 31 May 2005, 1:36 AM CET


Firewalls and worms
Some of the activity that worms/viruses can cause may not be caught by anti-virus software. [more]
Monday, 30 May 2005, 1:39 PM CET


US biometric ID request raises ID concern in UK
The UK government plans to issue its ID card as a passport with biometric identifiers stored in a chip – and the US wants those chips to be compatible with its own scanners, raising the possibility that US agencies could have access to the ID Card database. [more]
Monday, 30 May 2005, 1:37 PM CET


Criminal intent: what, me worry?
How much cybercrime simply goes undetected? [more]
Monday, 30 May 2005, 8:59 AM CET


Security best practices
Centralization, automation, problem prioritization--many IT-security professionals are embracing those concepts as they fight off the never-ending onslaught of threats. [more]
Monday, 30 May 2005, 8:57 AM CET


OvisLink RS-1000 Security Gateway reviewed
The appliance focuses purely on broadband security so wireless networking is not on the menu which is a pity considering the price. [more]
Monday, 30 May 2005, 5:53 AM CET


Big Brother tries to muscle ISPs
The Bush administration asked a federal appeals court Friday to restore its ability to compel Internet service providers to turn over information about their customers or subscribers as part of its fight against terrorism. [more]
Monday, 30 May 2005, 3:10 AM CET


Hybrid worm wave of the future
A new worm that hit users this week is a perfect example of the future of malicious code, said Panda Software. And that future looks ominous. [more]
Monday, 30 May 2005, 2:35 AM CET


Feds take aim at spyware, but IT isn't optimistic
Many purveyors of spam are beyond the reach of two proposed laws, tech pros say. [more]
Monday, 30 May 2005, 1:52 AM CET


Managing IM and e-mail threats in the workplace
Unmanaged instant messaging is becoming a major problem in the workplace, security experts warn. According to Francis Costello, chief marketing officer for Akonix Systems, a provider of software to manage instant messaging and e-mail, 80 to 90 percent of all companies have some instant messaging in use by employees. [more]
Monday, 30 May 2005, 1:12 AM CET


BT cracks down on rogue diallers
BT is bragging that it's "winning the fight against unwanted internet diallers" following the launch of its modem protection software at the beginning of May. [more]
Friday, 27 May 2005, 7:37 PM CET


Network intrusion prompts Stanford to warn of possible data theft
It is warning users of its Career Development Center about the incident. [more]
Friday, 27 May 2005, 7:36 PM CET


Four ways to secure enterprise instant messaging
While instant messaging is a useful tool, enterprises need to protect themselves against threats. [more]
Friday, 27 May 2005, 4:05 PM CET


EU zombie army leads the world
Quarter of all PCs infected with zombies located in EU. [more]
Friday, 27 May 2005, 4:01 PM CET


Earthlink releases hacked firmware for Linksys routers
Experimental IPv6, thanks to the GPL. [more]
Friday, 27 May 2005, 3:48 PM CET


Fraud expert becomes victim of credit card crime
The founder of an anti-fraud website has himself become the victim of credit card fraud. [more]
Friday, 27 May 2005, 2:09 PM CET


Summer of slimming spam for women
May 2005 saw a sharp rise in the amount of spam targeted at women, particularly for slimming products. [more]
Friday, 27 May 2005, 2:08 PM CET


For security, the eyes have it
Iris scans and fingerprint identification will become commonplace for international travelers as these sophisticated biometrics supplant traditional airport security methods, a top Homeland Security official says. [more]
Friday, 27 May 2005, 9:56 AM CET


GAO report questions DHS cybersecurity efforts
Homeland security department needs better partnerships with private industry and stronger cybersecurity leadership, report finds. [more]
Friday, 27 May 2005, 9:55 AM CET


CIA war game simulates major Internet attack
Dubbed 'Silent Horizon,' the attack scenario is set five years in the future. [more]
Friday, 27 May 2005, 9:53 AM CET


After theft, Bank of America tightens online security
SiteKey service will recognize when a bank account is being accessed via an unknown computer. [more]
Friday, 27 May 2005, 9:48 AM CET


Firefox users snap up Netcraft's antiphishing toolbar
Netcraft's toolbar blocks access to reported phishing sites. [more]
Thursday, 26 May 2005, 6:35 PM CET


Spyware vs. viruses: two different fights
Malware, whether it be spyware, adware or viruses, has been the focus of many recent studies conducted by the media, universities and vendors. [more]
Thursday, 26 May 2005, 6:33 PM CET


Deleting spyware: a criminal act?
On my computer right now I have three anti-spyware programs, three anti-virus programs, and three anti-spam programs, together with a hardware and software firewall, an IPsec VPN, and data level encryption on certain files. [more]
Thursday, 26 May 2005, 11:42 AM CET


Three tools to help you configure iptables
Every user whose client connects to the Internet should configure his firewall immediately after installation. [more]
Thursday, 26 May 2005, 11:41 AM CET


UK ID scheme rides again, as biggest ID fraud of them all
Home Secretary Charles Clarke is "aware of the genuine concerns" over the UK ID scheme, but the Bill his department reintroduced to Parliament today is, according to Home Office Minister Tony McNulty, "in essence... the same Bill". [more]
Thursday, 26 May 2005, 11:38 AM CET


Security's weakest links
Not a month has gone by in 2005 without a far-reaching computer security breach making the nightly news hour. [more]
Thursday, 26 May 2005, 11:27 AM CET


Hackers could crash Cisco IP phones
A software flaw in Cisco voice over IP phones could allow hackers to crash them. [more]
Wednesday, 25 May 2005, 2:08 PM CET


Witty worm flaws reveal source, initial targets
The worm's creator used a computer at an European ISP to spread the program Internet-wide a year ago, starting with 110 systems at a U.S. military base, an analysis reveals. [more]
Wednesday, 25 May 2005, 2:07 PM CET


EU biometric visa trial opts for the tinfoil sleeve
The US-inspired wet dream of a single, global identity document isn't quite dead, but with the announcement of Europe's biometric visa trial this week it doesn't look well. [more]
Wednesday, 25 May 2005, 2:04 PM CET


Database hackers reveal tactics
Three suspects in the recent LexisNexis security breach talk about how they got hold of the data and what they planned to do with it. [more]
Wednesday, 25 May 2005, 12:06 PM CET


Gerhard Eschelbeck on the Common Vulnerability Scoring System
In this audio Mr. Eschelbeck discusses the emerging standard in vulnerability scoring. This rating system is designed to provide open and universally standard severity ratings of software vulnerabilities. [more]
Wednesday, 25 May 2005, 11:55 AM CET


Students' files hacked at career center
The Career Development Center, or CDC, notified students yesterday that its computer system was “improperly accessed from outside of the Stanford network” on May 11. [more]
Wednesday, 25 May 2005, 11:42 AM CET


Put policies before products in IT security battle
Two-thirds of respondents to AusCert's 2005 Computer Crime Survey admit there is still room for improvement when it comes to IT security staff training. [more]
Wednesday, 25 May 2005, 11:37 AM CET


Sentry CD - a different firewall approach
Sentry Firewall CD is a highly configurable, bootable CD that takes a minimalist approach to firewalling. [more]
Wednesday, 25 May 2005, 11:34 AM CET


IBM unveils privacy software
Users can share data anonymously. [more]
Wednesday, 25 May 2005, 4:12 AM CET


Hackers holding private computer files "hostage"
Computer users already anxious about viruses and identity theft have a new reason to worry: Hackers have now found a way to lock up the electronic documents on your computer and then demand $200 over the Internet to get them back. [more]
Wednesday, 25 May 2005, 3:03 AM CET


Oracle's security head talks from the trenches
CSO Mary Ann Davidson talks about software auditing and other lines of defense in the fight for information. [more]
Wednesday, 25 May 2005, 2:16 AM CET


ISPs urged to throttle spam zombies
The US Federal Trade Commission (FTC), along with more than 35 government agencies worldwide, announced an ambitious effort on Tuesday to get ISPs and other organisations to deliver the net from the plague of zombie spam networks. [more]
Wednesday, 25 May 2005, 1:04 AM CET


Terminal security
Before you fire an IT employee, especially one with network privileges, prepare for the worst. [more]
Tuesday, 24 May 2005, 4:08 PM CET


Obfuscated shellcode, the wolf in sheep's clothing (part 1)
This article will describe just what shellcode is, and how it relates to exploit code. Also explained will be some advances in exploit code development in an effort to further stealth the presence of certain shellcode characteristics. [more]
Tuesday, 24 May 2005, 4:07 PM CET


CA patches high-risk security hole
A “high-risk” security flaw in Computer Associates anti-virus products could put users at risk, the supplier has warned. [more]
Tuesday, 24 May 2005, 1:45 PM CET


Security still top of the list for IT managers
BCS survey reveals difficulty in justifying infrastructure investment. [more]
Tuesday, 24 May 2005, 1:44 PM CET


Utility cybersecurity plan questioned
A set of cybersecurity standards proposed by the North American Electric Reliability Council (NERC) are too detailed in some instances, attendees at an industry conference here said last week. [more]
Tuesday, 24 May 2005, 11:53 AM CET


Uh, folks, your data was swiped
In all, nearly 700,000 customers of four banks may be affected, according to police in Hackensack, New Jersey, where the investigation was centered. [more]
Tuesday, 24 May 2005, 11:52 AM CET


Put policies before products in IT security battle
Two-thirds of respondents to AusCert's 2005 Computer Crime Survey admit there is still room for improvement when it comes to IT security staff training. [more]
Tuesday, 24 May 2005, 11:39 AM CET


Security breach at US banks offers opportunity for phishers
Is it real, or is it a phishing scam? This week's headlines give unintended credibility to one of the phisher's most effective social engineering tactics - the urgent warning that a customer's account has been compromised. [more]
Tuesday, 24 May 2005, 11:38 AM CET


Radicati forecasts big increase in virus e-mail traffic
The latest batch of Radicati Group statistics and forecasts contains some not so surprising, but definitely interesting news. [more]
Tuesday, 24 May 2005, 11:37 AM CET


Weakness in security algorithms 'means trouble', says analyst
The recently discovered bug allowing timing attacks against cryptographic algorithms could allow hackers to measure the behaviour of cryptographic software to reveal information about its keys. [more]
Tuesday, 24 May 2005, 11:30 AM CET


Secure and private browsing with Squid
Browsing a site that supports SSL is a definite way to make sure no one can snoop in on what you're doing -- which is a good thing when you're doing something personal like checking email over the web or buying something from amazon. [more]
Monday, 23 May 2005, 4:41 PM CET


Government report tackles VoIP security
The National Institute for Standards and Technology (NIST) issues helpful guidelines for securing IP communications. [more]
Monday, 23 May 2005, 4:40 PM CET


An easier way to secure wireless networks
Even experienced networking pros have trouble configuring security on today's Wi-Fi networks. [more]
Monday, 23 May 2005, 4:39 PM CET


Does Firefox really provide more security than Internet Explorer?
Even though Internet Explorer is by far the most widely used browser, since 2004 it slowly began losing popularity to other browsers mainly due to security issues. Is Firefox more secure than Internet Explorer? What will the future bring? [more]
Monday, 23 May 2005, 4:27 PM CET


Patching Windows cheaper than patching Linux?
A Microsoft-sponsored study finds that patch management of Windows clients and servers can cost less than that of comparable open-source systems. [more]
Monday, 23 May 2005, 12:55 PM CET


Addressing 'DDoS extortion'
Paying an extortionist a few thousand dollars to leave your network alone might make bottom-line business sense... [more]
Monday, 23 May 2005, 12:54 PM CET


MS UK recruits FBI man
Microsoft has head-hunted a senior legal officer from the FBI to become its chief security advisor in the UK. [more]
Monday, 23 May 2005, 12:53 PM CET


E-mail attackers know all about you
Spammers and scammers are finding new ways to uncover your e-mail address, and a whole host of personal information along with it. [more]
Monday, 23 May 2005, 12:50 PM CET


Phishers learn to exploit VeriSign
At least one Net scammer has co-opted the Web security-assurance company's seal of approval to offer a false impression of safety. [more]
Monday, 23 May 2005, 12:49 PM CET


Experts warn against hiring hackers
While a hacker may sound like the perfect person to hire to spot flaws in network security, they do not actually make for good employees in the industry, experts warn. [more]
Monday, 23 May 2005, 12:02 PM CET


Hacker hunters
An elite force takes on the dark side of computing. [more]
Monday, 23 May 2005, 11:55 AM CET


Underground showdown: defacers take on phishers
Groups fighting against online criminals intent on phishing have gained allies from another species of underground miscreant: website defacers. [more]
Monday, 23 May 2005, 11:44 AM CET


Security costs mount: study
The cost of IT security for Australian business continues to mount, despite fewer organisations reporting security problems, the latest national computer crime survey has found. [more]
Monday, 23 May 2005, 11:20 AM CET


LAND attack threat 'not significant', says Microsoft
Microsoft has rejected the seriousness of a security warning about its software. On Tuesday the French Security Incident Response Team (FrSIRT) issued an alert about a security bug in Microsoft's implementation of TCP/IP in Windows XP and 2003. [more]
Friday, 20 May 2005, 11:59 AM CET


Securing 'strange' Wi-Fi devices
Columbitech announced a wireless VPN solution for 802.11-based VoIP phones that allows session persistence as users roam among any wireless IP-based networks. [more]
Friday, 20 May 2005, 11:58 AM CET


Vigilantes mutilate phishing sites
Online vigilantes are taking matters into their own hands, and defacing some phishing sites to warn off the naive. [more]
Friday, 20 May 2005, 5:31 AM CET


Indian tech firms take steps to stop fraud
Workers registry aimed at assuaging overseas fears. [more]
Friday, 20 May 2005, 5:30 AM CET


Phreaking phones with a voice recorder
The process called phreaking, is illegal of course, but has been a classic hacker challenge for almost 50 years. [more]
Friday, 20 May 2005, 5:25 AM CET


Feds investigating LexisNexis hacking
Federal agents have carried out searches in at least two states as part of the investigation of the theft of Social Security numbers and other personal information from database giant LexisNexis Inc. [more]
Friday, 20 May 2005, 5:21 AM CET


PowerPC SoCs gain security hardware
AMCC is sampling the first processors in its line of low-cost, low-power PowerPC SoCs (system-on-chips) processors to include security processing hardware. [more]
Friday, 20 May 2005, 5:20 AM CET


Behind the scenes of phishing attacks
This white paper includes extensive amounts of supporting information, with many hyperlinks to more detailed data on specific attacks available inline. [more]
Friday, 20 May 2005, 4:21 AM CET


New directions for grid security
For this first Grid Stack column, I thought it would be interesting to catch up with some experts in distributed computing security, find out where we are with grid security today and where they see this all headed. [more]
Friday, 20 May 2005, 3:19 AM CET


Keeping kids from succumbing to 'the dark side'
Edward Ajaeb got his first taste of steganography in sixth grade, when he set up a Web site for his teacher's husband to showcase his master's thesis on the subject. [more]
Friday, 20 May 2005, 2:43 AM CET


Sit back and react
As the security industry moves more mainstream, it's becoming stagnant due to a lack of vision. Who will lead the charge? [more]
Friday, 20 May 2005, 1:50 AM CET


Popular Japanese Web site hit by major hack
It stayed online even though it may have been compromised by malware. [more]
Friday, 20 May 2005, 12:50 AM CET


Microsoft warns of TCP/IP flaw
Attacker could bring down a network connection. [more]
Friday, 20 May 2005, 12:48 AM CET


Government leadership in IT security is lacking
A panel of government and industry representatives on Wednesday agreed that the government has not provided adequate leadership for the nation’s cybersecurity, but that is just about all they agreed on. [more]
Friday, 20 May 2005, 12:46 AM CET


Paris Hilton hack started with old-fashioned con
Computer security flaws played a role in the attack, which exploited a programming glitch in the Web site of Hilton's cell T-Mobile. [more]
Friday, 20 May 2005, 12:45 AM CET


Using dual accounts for administrators
With security on the minds of everyone, including all administrators and executives, every precaution needs to be taken to protect the network devices, servers, clients, Active Directory, and network resources. [more]
Thursday, 19 May 2005, 8:09 PM CET


Test Run: RSA's SecurID appliance
Now, small and midsize businesses can have two-factor authentication minus high costs and management complexities. [more]
Thursday, 19 May 2005, 5:30 PM CET


Let the experts secure IT
Companies should consider outsourcing their IT security rather than do it in-house, as this is cost-effective and ensures the right skills are available around the clock, says Telkom. [more]
Thursday, 19 May 2005, 2:04 PM CET


Google pushes security in enterprise desktop search launch
Google said the corporate application, available for download at no charge, gives IT administrators control over the product's communication with Google servers. [more]
Thursday, 19 May 2005, 2:03 PM CET


Data theft involving four banks could affect 500,000 customers
'This thing's getting bigger and bigger,' says one police officer. [more]
Thursday, 19 May 2005, 1:54 PM CET


U.K. government warns of IPSec VPN vulnerability
An advisory from a U.K. government group says that certain configurations of remote access IPSec VPNs are susceptible to attacks. [more]
Thursday, 19 May 2005, 1:53 PM CET


Home PCs launch phishing attacks
Phishing attacks are growing more sophisticated as attackers devise ever more devious means to stay at least one step ahead of banks and others fighting the contain fraudulent scams, according to a study from The Honeynet Project. [more]
Thursday, 19 May 2005, 1:23 PM CET


Fujitsu plans palm vein security international launch
Japanese banks are using the system as alternative to personal ID numbers for ATM transactions. [more]
Thursday, 19 May 2005, 1:22 PM CET


Chrooted Snort on Solaris
This paper will focus on installing a Snort IDS on the Solaris operating system, and securing it in a chrooted environment. [more]
Thursday, 19 May 2005, 1:21 PM CET


Security gets a makeover in Netscape 8.0
AOL unwrapped its latest Netscape 8.0 browser with more security and ease-of-use functionality for novice Web surfers. [more]
Thursday, 19 May 2005, 1:12 PM CET


UK banks ignore security audit findings
Some UK corporates routinely ignore the findings of security audits treating them solely as a necessary step to satisfy corporate governance regulations, according to an experienced penetration tester. [more]
Thursday, 19 May 2005, 1:10 PM CET


Nokia releases "bluesnarfing" fix
More than six months after acknowledging a Bluetooth security flaw in a number of its mobile phones, Nokia said it has released a software upgrade that fixes the vulnerabilities in some of its products. [more]
Wednesday, 18 May 2005, 1:43 PM CET


Spam and malware detections at 100,000 per hour
Spam detection software company Mail-Filters.com reported that last week its servers had detected an average of 103,967 sources of spam or malware per hour being sent to its customers. [more]
Wednesday, 18 May 2005, 9:52 AM CET


Microsoft hunts web nasties with honey monkeys
Researchers at Microsoft are creating their own version of a million monkeys to crawl the internet looking for threats in an effort to secure the web for Windows. [more]
Wednesday, 18 May 2005, 9:51 AM CET


U.S. House to debate new cybersecurity post
The proposal is part of more extensive homeland security legislation. [more]
Wednesday, 18 May 2005, 9:49 AM CET


Feds faulted for weak wireless security
Federal agencies have yet to fully apply key controls such as policies, practices, and tools to let them operate wireless networks securely, congressional auditors report. [more]
Wednesday, 18 May 2005, 9:46 AM CET


Social engineering still alive and kicking
A simple call to Network Solutions provides enough to hack a site. [more]
Wednesday, 18 May 2005, 9:04 AM CET


Revenge motivates insider hacking attacks
Thirst for revenge against the boss fuelled the majority of insider hacking attacks, according to a US government survey published this week. [more]
Wednesday, 18 May 2005, 8:17 AM CET


Combating spam
Spam is back in the news, and it has a new name. This time it's voice-over-IP spam, and it has the clever name of "spit" (spam over Internet telephony). Spit has the potential to completely ruin VoIP. [more]
Wednesday, 18 May 2005, 7:02 AM CET


Extortion via DDoS on the rise
Criminals are increasingly targeting corporations with distributed denial-of-service attacks designed not to disrupt business networks but to extort thousands of dollars from the companies. [more]
Wednesday, 18 May 2005, 6:01 AM CET


Wireless security risks at an integrated academic health system
Wireless networking is increasingly popular in academic health system and university institutions, but this communal environment presents security issues. [more]
Wednesday, 18 May 2005, 5:30 AM CET


Bills in U.S. Congress target ID theft
Expect the U.S. Congress to pass new rules regulating the way companies handle customer data after recent leaks of personal information by data collectors ChoicePoint and LexisNexis, among other companies. [more]
Wednesday, 18 May 2005, 4:56 AM CET


Domain footprinting for Web applications and Web services
This paper demonstrates how advanced search options offered by search engines like Google, A9, Yahoo, Alexa and others can be leveraged to obtain critical information about domains. [more]
Tuesday, 17 May 2005, 6:40 PM CET


Worst browser threats may not be security holes
Experts in combating "spyware" and "adware" are now warning that the widely publicized security holes that plague Internet Explorer and other Web browsers may not be the most common ways unwanted software gets into computer users' PCs. [more]
Tuesday, 17 May 2005, 6:30 PM CET


Preserving digital evidence to bring attackers to justice
In this article, we’ll explain how standard rules of evidence apply to digital data and what precautions you should take to preserve it properly for a court trial. [more]
Tuesday, 17 May 2005, 6:29 PM CET


Researchers find vulnerability in common security protocol
Business networks are at risk because of vulnerabilities in a widely used security protocol. [more]
Tuesday, 17 May 2005, 6:28 PM CET


Hoax mail tries to crack FNB passwords
Cyber criminals are reported to be attempting to steal the banking details of FNB online banking clients. [more]
Tuesday, 17 May 2005, 6:27 PM CET


Security threat seen in Intel's hyper-threading technology
A student claims to have found a security problem with Intel Corp.'s Hyper-Threading Technology. Hackers can reportedly steal passwords based on systems with the technology, according to the student. [more]
Tuesday, 17 May 2005, 6:25 PM CET


Phishing gets personal
Fraudsters are using stolen information to lure victims into divulging additional sensitive information in a new form of phishing attack. [more]
Tuesday, 17 May 2005, 6:19 PM CET


Bilingual Sober virus travels far and wide
Sober has contained German messages since it was first identified. "If you look at the first couple of variants of Sober, they didn't even spread outside of Germany," noted Bruce Hughes, senior virus researcher at Trend Micro. [more]
Tuesday, 17 May 2005, 6:18 PM CET


Combining information security and compliance
Software from Elemental Security combines access control, policy management, and compliance features to make it easier for companies to improve data security and regulatory compliance. [more]
Tuesday, 17 May 2005, 6:17 PM CET


Yahoo, SBC offer free online security suite
Suite gives DSL customers new antispyware, antivirus tools, and e-mail protection. [more]
Tuesday, 17 May 2005, 6:16 PM CET


Secrets and spies
It might be hype of the month, but that doesn't mean it won't gobble up your customers. Simon Meredith investigates spyware in the second of our five-part security series. [more]
Monday, 16 May 2005, 7:52 PM CET


German Sober.Q worm floods inboxes
A new variant of the Sober worm has begun to flood inboxes with hundreds, and even thousands, of junk messages that link to news stories about Sober. [more]
Monday, 16 May 2005, 7:49 PM CET


The mystery of the failing POP3 access with ISA 2000
You have configured your ISA 2000 server and internal clients according to best practices. Everything is running smoothly except that a lot of users are complaining about connection problems when accessing an external POP3 server. If you want to know why this can happen and how to solve that problem, read on. [more]
Monday, 16 May 2005, 7:48 PM CET


Microsoft anti-virus?
Microsoft's announcement that it will enter the AV market next year, with initial trials starting next week, could be a sign of many things to come. [more]
Monday, 16 May 2005, 5:22 AM CET


Invalid banking cert spooks only one user in 300
Up to 300 BankDirect customers were presented with a security alert when they visited the bank's website earlier this month — and all but one dismissed the warning and carried on with their banking. [more]
Monday, 16 May 2005, 4:01 AM CET


Free wireless software provides entry-level security
Mike Klein, CEO of network security firm Interlink Networks, knows a good marketing tactic when he sees one. When Zone Labs started giving away no-nonsense firewall protection as a free download, he was paying attention. [more]
Monday, 16 May 2005, 3:33 AM CET


Microsoft readies PC security, tools bundle
Microsoft is readying a new consumer security product that offers virus and spyware protection, a new firewall and several tune-up tools for Windows PCs, a move that pits the software giant squarely against traditional security software vendors. [more]
Monday, 16 May 2005, 2:06 AM CET


Security risks with RFID
Companies need to protect their data by ensuring that the RFID technology they adopt supports their corporate security policies. [more]
Monday, 16 May 2005, 1:12 AM CET


Microsoft helps with security
Microsoft is set to provide the Government with more information about software vulnerabilities and assistance in the event of an e-security crisis. [more]
Monday, 16 May 2005, 12:04 AM CET


Teamwork will beat the spammers
More than two-thirds of all email traffic is spam. But the problem could be reduced if our computers work together to control it. [more]
Friday, 13 May 2005, 11:10 AM CET


Biometrics: getting back to business
After 9/11, public-sector interest in biometrics spiked, but standards and stringent scalability testing are still needed to trigger widespread corporate adoption. [more]
Friday, 13 May 2005, 10:39 AM CET


Trusting in 802.1X endpoint security
Funk Software —one of the TCG's contributor members—announced during Interop last week that it is adopting support for the TNC's endpoint integrity standard in it's RADIUS server and 802.1X client. [more]
Friday, 13 May 2005, 9:16 AM CET


Windows Mobile 5.0 application security
Every Windows Mobile–based device implements a set of security policies that determine whether an application is allowed to run and, if allowed, with what level of trust. [more]
Friday, 13 May 2005, 8:13 AM CET


Massachusetts fires legal broadside at spam gang
Massachusetts Attorney General Tom Reilly obtained an emergency court order on Wednesday shutting down dozens of websites allegedly operated by a sophisticated ring of Boston area spammers. [more]
Friday, 13 May 2005, 7:39 AM CET


Identity management lockdown forced by regulation, reputation
It seems the embarrassing, damaging corporate-senior-moment data disclosures keep on coming: ChoicePoint, Bank of America, Lexis-Nexis, Ameritrade, and others - with more on the way - given the sloppy fashion in which many more corporations handle personal employee and customer data, some experts say. [more]
Friday, 13 May 2005, 6:17 AM CET


Industry experts want federal law to tackle spyware
Congress should enact a federal law to fight the increasing menace of spyware software and partner with other countries to ensure offenders don't move their businesses offshore, industry experts told a congressional panel Wednesday. [more]
Friday, 13 May 2005, 5:31 AM CET


Microsoft unveils details of software security process
Microsoft revealed on Thursday (5 May) some details of the company's struggle to develop Service Pack 2, the massive security update released last August to harden Windows XP. [more]
Friday, 13 May 2005, 4:58 AM CET


Security firms fight Firefox fire with fire
FraudEliminator, Anonymizer aid newly popular browser. [more]
Friday, 13 May 2005, 3:38 AM CET


European security appliance sales soar
Unified threat management devices drive main growth, reports IDC. [more]
Friday, 13 May 2005, 2:13 AM CET


Microsoft bolsters XP wireless security
Microsoft has released an update to Windows XP Service Pack 2 that fortifies the operating system's wireless networking security. [more]
Friday, 13 May 2005, 1:47 AM CET


Cisco confirms arrest in theft of its code
The incident has been a matter of concern because malicious hackers might find flaws in the code that could be exploited to impair the functioning of Cisco's routers, which handle a significant portion of traffic on the Internet. [more]
Thursday, 12 May 2005, 5:36 PM CET


'Network effect' can cut identity theft
Sharing information about online attacks is vital. [more]
Thursday, 12 May 2005, 1:12 PM CET


New HP notebooks focus on security
HP's latest series of notebooks for business security carries features that take into consideration what a business user wants in a laptop. [more]
Thursday, 12 May 2005, 11:35 AM CET


Protecting your PC
5 Tips: Ways to make your computer more secure. [more]
Thursday, 12 May 2005, 9:15 AM CET


A Sober-ing look at social engineering
The Sober worm is back, and it's using an old trick. Two new incarnations of the Sober computer worm, W32/Sober-N and W32/Sober.p, spread across the Internet over the past few days, infecting home and business PCs around the globe (see story). [more]
Thursday, 12 May 2005, 9:09 AM CET


Bruce Schneier on cryptography
An interview with Bruce Schneier on some current trends in cryptography. [more]
Thursday, 12 May 2005, 9:05 AM CET


Poachers turn over Microsoft Gatekeeper security test
Microsoft last week pulled the plug on an online security competition after it emerged that system flaws enabled entrants to manipulate their scores. [more]
Thursday, 12 May 2005, 9:04 AM CET


Serious holes in antivirus software
What if the bad guys found ways to infiltrate your computer through the very antivirus software that you thought was protecting you? Recent discoveries suggest that this scenario isn't so far-fetched. [more]
Thursday, 12 May 2005, 6:46 AM CET


Microsoft helps thwart infamous spam ring
Microsoft's Internet Safety Enforcement team helped in the investigation by gathering and providing evidence of the defendants' high-volume, illegal spam campaigns. [more]
Thursday, 12 May 2005, 5:33 AM CET


Security players shoot an all-in-one
Juniper Networks, Cisco Systems and 3Com's TippingPoint division are integrating a trifecta of security features into all-in-one appliances that give partners new ways to help cut the cost and complexity of security solutions. [more]
Thursday, 12 May 2005, 4:04 AM CET


Security concerns outweigh all other IT headaches
High-profile fraud attempts and Sarbox requirements have brought security to the fore. [more]
Thursday, 12 May 2005, 3:42 AM CET


DoD hacker jailed for 21 months
A US hacker convicted of infecting Department of Defense with a computer worm was last week sentenced to 21 months imprisonment. [more]
Thursday, 12 May 2005, 2:06 AM CET


Sober worm hides from AV scanners
One of the reasons why the Sober.p worm continues to spread is because of the way it hides from some anti-virus scanners, a Russian security firm said Wednesday. [more]
Thursday, 12 May 2005, 1:28 AM CET


Microsoft issues solitary patch
Microsoft's patch Tuesday brought just one security update yesterday, a fix for a script injection vulnerability rated by Microsoft as "important". [more]
Wednesday, 11 May 2005, 3:35 PM CET


Messaging security pros get back to basics
Gone are the days when viruses were the number one concern of messaging administrators. [more]
Wednesday, 11 May 2005, 3:31 PM CET


IBM rolls out security apps for SMBs
Hoping to address the two most pressing concerns among SMBs, namely security and compliance, IBM Tuesday is rolling out a series of bundled applications and managed services offerings to be part of its Express line of offerings. [more]
Wednesday, 11 May 2005, 3:29 PM CET


Cisco source code theft part of 'mega-hack'
The theft of proprietary source code from Cisco Systems last year was part of a much larger attack that breached "thousands of computer systems", according to investigators. [more]
Wednesday, 11 May 2005, 3:25 PM CET


Trend Micro to buy anti-spyware firm InterMute
Trend Micro today announced its intent to acquire privately held anti-spyware software provider InterMute Inc., which makes both consumer and enterprise SpySubtract products, for $15 million. [more]
Wednesday, 11 May 2005, 3:23 PM CET


Microsoft calls for online identity overhaul
Replacement for failed Passport system to be unveiled this week. [more]
Wednesday, 11 May 2005, 3:22 PM CET


Novell snaps up Linux security company
Purchase of Immunix will boost product offerings, company says. [more]
Wednesday, 11 May 2005, 3:21 PM CET


Spyware threat takes pole position
More worrying than spam, phishing and hacking, say IT managers. [more]
Wednesday, 11 May 2005, 3:19 PM CET


MasterCard shuts down 1,400 phishing sites
But the number of phishing sites continued to grow by 26% per month between July and February. [more]
Wednesday, 11 May 2005, 3:18 PM CET


Telewest blacklisted for virus infestation
Cable firm promises built-in security software from the summer. [more]
Wednesday, 11 May 2005, 3:11 PM CET


Symantec intros on-the-go security
Symantec introduced its new mobile security software, Symantec Mobile Security 4.0, designed to provide integrated anti-virus and firewall technology for Series 60 and series 80 smart phones using the Symbian OS. [more]
Wednesday, 11 May 2005, 3:10 PM CET


Install OpenBSD to secure your Web server
Designed to be "secure by default", the OpenBSD server operating system offers comprehensive security features. Learn how to perform a network install of this OS—along with PHP4 and MySQL—to keep sensitive data protected. [more]
Tuesday, 10 May 2005, 9:19 AM CET


Google - experts say outage not related to hackers
Google and security experts said a brief weekend outage of the Internet search giant's website was not due to a hacker attack, despite fears it was linked to a new type of Web hijacking. [more]
Tuesday, 10 May 2005, 8:47 AM CET


Firefox suffers 'extremely critical' security hole
Security researchers say exploit code is already circulating online. [more]
Tuesday, 10 May 2005, 7:50 AM CET


Smart advice: security tactics
Best practices for determining whether to use hardware or software, and calculating help-desk ROI. [more]
Tuesday, 10 May 2005, 6:05 AM CET


Developer demonstrates Dashboard exploit
At issue is a feature in Safari called "Open safe files" that is turned on by default. This feature allows your Mac to automatically open image files, PDFs, movies, disk images and other files considered safe when downloaded. Unfortunately, this also includes widget files downloaded, which are installed when opened. [more]
Tuesday, 10 May 2005, 5:27 AM CET


Vendors partner on data encryption
Vontu provides content filtering and monitoring, and PGP provides encryption to make it easier to set up policies to automatically protect data. [more]
Tuesday, 10 May 2005, 4:06 AM CET


Juniper intros new security platforms
Juniper Networks announced the availability of two firewall/VPN systems. [more]
Tuesday, 10 May 2005, 3:25 AM CET


National data security law gains momentum
Support for a national data security law appears to be growing, with ChoicePoint and Bank of America throwing their support behind a national disclosure law in a Capitol Hill hearing this week. [more]
Tuesday, 10 May 2005, 2:47 AM CET


Symantec unveils Symbian anti-virus, firewall software
Security vendor Symantec Monday rolled out an integrated anti-virus and firewall program for smartphones based on the Symbian platform. [more]
Tuesday, 10 May 2005, 1:34 AM CET


The great intrusion prevention debate
Will the intrusion prevention system revolutionize security? Or is it just another point solution? [more]
Monday, 9 May 2005, 6:11 PM CET


Lurking liabilities in security law
Five new legal issues in security can cause trouble for the unwary CIO. [more]
Monday, 9 May 2005, 6:10 PM CET


Think before deploying Security-Enhanced Linux in RHEL 4
One of the most exciting new features in RHEL v.4 is the implementation of Security-Enhanced Linux (SELinux). In this tip, we'll look at how you can use it to beef up system security. [more]
Monday, 9 May 2005, 6:08 PM CET


IBM delivers Tivoli identity software
New package eases ID management. [more]
Monday, 9 May 2005, 6:02 PM CET


A firewall that's faster, and less complex
Firewalls can do a good job of preventing intrusions and helping to track down malicious threats that have gained entrance to a network. But if the process takes too long, network performance can be slowed. [more]
Monday, 9 May 2005, 11:59 AM CET


Web application defense at the gates – leveraging IHttpModule
The .Net framework with ASP.NET provides the IHttpModule interface access to HTTP pipes - the lowest of programming layers - before an incoming HTTP request hits the web application. This can provide defense at the gates. In this paper, we look at how one can build this sort of defense in all three aspects - coding, deployment and configuration. [more]
Monday, 9 May 2005, 11:51 AM CET


Snaring the scammers
One auction customer who'd had enough set out to catch a crook. [more]
Monday, 9 May 2005, 4:43 AM CET


Microsoft revamps security hole approach
Timely advisories to monthly Security Bulletins now in pilot program. [more]
Monday, 9 May 2005, 3:03 AM CET


Security concerns limit online activity
Most computer users would do more online were it not for fears over internet security, according to a survey of 500 internet users in New Zealand and Australia. [more]
Monday, 9 May 2005, 2:13 AM CET


Spitzer sets sights on spyware
Purveyors of spyware and adware and even the major companies that advertise in the surreptitious downloads fear Attorney General Eliot Spitzer. [more]
Monday, 9 May 2005, 1:28 AM CET


Your identity, open to all
ZabaSearch is a new search engine for finding the unlisted numbers of celebrities, as well as their addresses and satellite pictures of their homes. Trouble is, you're in there too. Is ZabaSearch an invasion of privacy? [more]
Friday, 6 May 2005, 12:59 PM CET


Hackers crack Sony PSP discs
First step in making illegal copies of the software. [more]
Friday, 6 May 2005, 12:56 PM CET


Phishers use keyloggers to steal Internet users' identity
Analysts said keylogging is a new tactic for phishers, who in the past have depended more on user interaction with e-mails and instant messages that sought to lure their victims to fake sites of popular e-commerce brands. [more]
Friday, 6 May 2005, 11:30 AM CET


Software firewalls versus wormhole tunnels
This article presents some of the major differences between hardware and software firewalls and illustrates the real challenges faced by software firewall vendors. [more]
Friday, 6 May 2005, 11:28 AM CET


Phishers turn DNS against authorities
Phishing scammers are cleverly abusing automated "bots" by targeting DNS servers, security experts have warned. The new technique makes it significantly harder to shut down phishing sites. [more]
Friday, 6 May 2005, 10:34 AM CET


April brings spam and virus deluge
E-mail security vendor FrontBridge Technologies reports spam and virus totals for the month of April peaked at 94% of total inbound E-mail and averaged 86%. [more]
Friday, 6 May 2005, 4:07 AM CET


Web scammers sell Indian PM's house to American
You'd imagine there is not a man, woman or child in Christendom who has not heard the classic - and likely apocryphal - tale of how enterprising Londoners sold the defunct old London Bridge to some enthusiastic Americans who thought they were buying Tower Bridge. [more]
Friday, 6 May 2005, 3:49 AM CET


Shocking things about the ChoicePoint debacle
At first, the ChoicePoint security breach seemed not only ordinary but almost insignificant... [more]
Friday, 6 May 2005, 2:14 AM CET


Sober still accounts for 4 of 5 worms and viruses
Sober.p, the worm that stormed the Internet Monday, showed no signs of fading away as of Thursday morning, an anti-virus vendor said. [more]
Friday, 6 May 2005, 1:08 AM CET


Cybersecurity expert Howard Schmidt joins security start-up
The former eBay and Microsoft exec is now at Electronic Lifestyle Integration Inc. [more]
Friday, 6 May 2005, 12:15 AM CET


Wireless network security for the home
According to a December 2004 study, 60 to 70 percent of all wireless networks are insecure. Although there is lots of information on securing wireless networks, most of this information focuses on corporate networks. In this article, I will attempt to help people secure their home wireless networks. [more]
Thursday, 5 May 2005, 5:22 PM CET


Users untouched by mobile viruses despite hype
The mobile phone virus threat is been wildly over-hyped, according to a support firm which says calls about infections by mobile malware are almost unknown. [more]
Thursday, 5 May 2005, 5:19 PM CET


Student hacks iTunes for compatibility
According to the Australian researcher who cracked the authentication used by Apple's iTunes software, current-generation Digital Rights Management (DRM) will never work. [more]
Thursday, 5 May 2005, 5:18 PM CET


Securing optical networks with quantum cryptography
As telecommunication links are intrinsically vulnerable to eavesdropping, cryptography is routinely used to protect data transmission. Quantum cryptography complements conventional cryptographic techniques to raise security of data transmission over optical fibre links to an unprecedented level. [more]
Thursday, 5 May 2005, 11:22 AM CET


Unpatched machines seen as major security threat
Hackers will keep cranking out exploits that take advantage of known software vulnerabilities because, although patches are available, a minority of machines are fixed, security vendor McAfee said Monday. [more]
Thursday, 5 May 2005, 11:19 AM CET


Performance versus security
Deploying endless security tools to the desktop slows performance and user productivity. [more]
Thursday, 5 May 2005, 11:01 AM CET


The 'nature' of net viruses
Scientists could learn a lot about the way natural systems work from the decidedly unnatural world of the Internet, according to research published earlier this year. [more]
Thursday, 5 May 2005, 10:55 AM CET


Is VoIP service the next big target for hackers?
Saving money with Internet telephony is popular right now, but security issues could ruin a good thing. [more]
Thursday, 5 May 2005, 10:54 AM CET


OS X patch targets security flaws stalking 'Panther'
Mac OS X users who have not upgraded to the new 10.4 Tiger release may want to pounce on this patch sooner rather than later. [more]
Thursday, 5 May 2005, 10:53 AM CET


Sober worm spreads via fake World Cup e-mails
"Many people will be eager to attend one of the biggest sporting events in the world next year, and may think it is worth the risk of opening the e-mail attachment just in case the prize is for real," said Sophos senior technology consultant Graham Cluley. [more]
Thursday, 5 May 2005, 10:51 AM CET


Secure programming with the OpenSSL API, part 2
Avoid the dreaded man in the middle (MITM) attack by securing the handshake during a Secure Sockets Layer (SSL) session. [more]
Wednesday, 4 May 2005, 4:48 PM CET


Spyware generates $2bn of profit a year
Spyware ­invasive programs that generate pop-ups, hijack home pages, redirect searches and poison DNS files ­generates an estimated $2bn in revenue a year, according to a study by anti-spyware firm Webroot. [more]
Wednesday, 4 May 2005, 3:41 PM CET


Brace for web worm chaos, users warned
Businesses should brace themselves for attack by sophisticated new worms capable of causing widespread disruption to the internet, security expert Bruce Schneier has warned. [more]
Wednesday, 4 May 2005, 12:34 PM CET


Security is top issue, says Cisco CEO
Cisco CEO John Chambers kicked off Interop 2005 Tuesday, highlighting the importance of integrated security in corporate networks, and how businesses can use a secure network infrastructure as a productivity-boosting tool. [more]
Wednesday, 4 May 2005, 12:08 PM CET


Web-based threats reach critical levels
Security watchdog reports 600 new flaws in the past three months. [more]
Wednesday, 4 May 2005, 11:53 AM CET


Hacking a SQL Server
We'll outline how attackers footprint, attack, and compromise SQL Server, followed by solutions for mitigating these threats. [more]
Wednesday, 4 May 2005, 10:51 AM CET


Brits fall prey to phishing
One in 20 Brits have lost money to some sort of online scam such as "phishing", according to research commissioned by AOL UK. [more]
Wednesday, 4 May 2005, 10:49 AM CET


Time Warner says data on 600,000 workers lost
Time Warner Inc. reported today that a shipment of backup tapes with personal information of about 600,000 current and former employees went missing more than a month ago during a routine shipment to an offsite storage site. [more]
Wednesday, 4 May 2005, 10:29 AM CET


Baked-in security
It's a problem at many organizations today: developers are so narrowly focused on quickly building feature-rich applications that security becomes an afterthought. [more]
Wednesday, 4 May 2005, 10:21 AM CET


A new security layer for Wi-Fi
Bringing a new level of security to consumers and IT organizations alike, Engim has forged a partnership with AirDefense to deliver an added layer of security in a Wi-Fi chip – an intrusion prevention system. [more]
Wednesday, 4 May 2005, 10:20 AM CET


Enabling Internet access for VPN clients connected to an ISA firewall
A problematic situation with the ISA Server 2000 firewall was that once a VPN client connected to the ISA Server 2000 firewall, they could not connect to the Internet using their default SecureNAT client configuration. [more]
Wednesday, 4 May 2005, 10:14 AM CET


Tools for wireless LAN defense updated
Two companies are separately updating their tools for protecting enterprise wireless LANs at this week's Interop trade show in Las Vegas. [more]
Tuesday, 3 May 2005, 11:43 AM CET


How to audit your network via packet analysis
What are the concerns that we as computer network professionals worry about in today's computing environment? [more]
Tuesday, 3 May 2005, 10:53 AM CET


The Second Commandment of system administration
Trust is a hard thing to come by in any workplace. Luckily for you, trust in your servers isn't. [more]
Tuesday, 3 May 2005, 10:43 AM CET


Secure video conferencing via quantum cryptography
If you use a webcam to talk with your mom, this tool is not for you. But if you're working for a company and that you have to routinely discuss about sensitive future projects or the possible acquisition of another company, you need more security, and this new video conferencing system based on quantum cryptography is a tool you need. [more]
Tuesday, 3 May 2005, 10:29 AM CET


Throw away your security gear
Want to make sure your network is safe? Your best step may be to throw away all of your security gear and software. [more]
Tuesday, 3 May 2005, 10:28 AM CET


Hackers target Mac OS and Linux
Malicious code writers are increasingly targeting non-Windows systems such as Mac OS and Linux, a security research group said Monday. [more]
Tuesday, 3 May 2005, 10:26 AM CET


Sarbanes Oxley for IT security?
Sarbanes Oxley seems wholly focused on the accuracy of a company's financial records and controls around these records, so where does IT security come into the picture? [more]
Tuesday, 3 May 2005, 10:25 AM CET


Eight top tips for network security
Protecting your network isn't about installing the right hardware and software. It's knowing how to use it, and how to set up the right security policies and procedures. We show you how. [more]
Tuesday, 3 May 2005, 4:11 AM CET


US faces embarassment over PDF security
Readers discovered that they could read a classified document in full - including top-secret details such as soldiers' names - with two clicks of a mouse. [more]
Tuesday, 3 May 2005, 3:06 AM CET


CompTIA adds wireless and security to certification
Exam updated for the first time since 2001 to include VPN, Wi-Fi. [more]
Tuesday, 3 May 2005, 2:21 AM CET


Where's the cybersecurity coverage these days?
Cyberinsurance isn't new, but five years into widely available policies, many companies still don't have policies in place. [more]
Tuesday, 3 May 2005, 1:09 AM CET


The cost of securing the people's privacy
As a bill on consumer privacy heads to the legislature, our security manager has to do a fiscal impact analysis. [more]
Monday, 2 May 2005, 4:17 PM CET


Chipmaker releases open source WLAN security software
WLAN chipmaker Atheros Communications said Monday that it will release its wireless security software on a free, open source basis. [more]
Monday, 2 May 2005, 4:16 PM CET


Group to demo ways to secure desktops
An industry consortium this week plans to demonstrate a specification for desktop policy enforcement that has been a year in the making. [more]
Monday, 2 May 2005, 4:15 PM CET


CNN on the spam attack?
Is CNN spamming bloggers critical of the network in an attempt to lower their page ranks? Or is the network trying to generate buzz for new shows? One blogger thinks CNN's up to something tricky on the net. [more]
Monday, 2 May 2005, 4:14 PM CET


Prevent pricey Wi-Fi security errors
An innocent-looking cafe may harbor a nest of fraudsters, identity thieves and other miscreants, security experts warn. [more]
Monday, 2 May 2005, 4:10 PM CET


Juniper targets Cisco with security strategy
Adds net access tools, details plans for broad offering. [more]
Monday, 2 May 2005, 4:09 PM CET


Audio - Qualys CTO on SANS top 20 quaterly update
During Infosecurity Europe 2005, we met up with Gerhard Eschelbeck, CTO of Qualys, and got his comment on the latest news on the SANS Top 20 list. In the team behind this Quarterly Vulnerability Update, Mr. Eschelbeck is representing the vulnerability management expert community. [more]
Monday, 2 May 2005, 1:14 PM CET


Sony Ericsson hacker appeals imprisonment
The Hungarian man sentenced to three years in prison for industrial espionage after hacking Ericsson and Sony Ericsson intranets last week appealed that sentence. [more]
Monday, 2 May 2005, 12:19 PM CET


Smart phone owners concerned over security threats, but ...
Most smartphone users are aware of the increasing risk of viruses attacking mobile devices, but they still store sensitive data on their phones. [more]
Monday, 2 May 2005, 12:18 PM CET


Reactivity demos WS-Security interoperability
Reactivity Inc. participated with 13 other industry leaders for the first time to demonstrate interoperability of the WS-Security OASIS Standard at the Gartner Application Integration and Web Services Summit in Los Angeles. [more]
Monday, 2 May 2005, 11:48 AM CET


Florida Uni on brown alert after hack attack
Students and staff at Florida International University (FIU) were warned they are at risk of identity fraud this week after techies discovered hackers had broken into college systems. [more]
Monday, 2 May 2005, 5:05 AM CET


Backup tapes are backdoor for ID thieves
Large companies are reconsidering their security and backup policies after a handful of financial and information-technology companies have admitted that tapes holding unencrypted customer data have gone missing. [more]
Monday, 2 May 2005, 5:02 AM CET


Apple's Tiger: the most impenetrable Mac system yet
Tiger is the most impenetrable Mac system yet, filled with new defenses against the dark arts. Messages alert you every time you download a file that could theoretically contain a virus. And a new "stealth mode" in Tiger's built-in firewall makes your Mac invisible to ping signals from Internet predators hunting for computers to infect. [more]
Monday, 2 May 2005, 4:59 AM CET


Mobile virus spreads
A virus that spreads from cell phone to cell phone has made its way to 20 different countries around the world, a Finnish anti-virus expert said. [more]
Monday, 2 May 2005, 4:56 AM CET


Spotlight

What can we learn from the top 10 biggest data breaches?

Posted on 21 August 2014.  |  Here's a list of the top 10 biggest data breaches of the last five years. It identifies the cause of each breach as well as the resulting financial and reputation damage suffered by each company.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //