Off the Wire

Off The Wire Archive

News items for June 2005

Encryption - the missing defence tool in many companies’ security policy
There is a real threat to data security if tapes are not encrypted, no matter how high the level of physical security used when transporting tapes to a ‘secure’ area away from the primary business location for disaster recovery plans. [more]
Thursday, 30 June 2005, 11:44 AM CET

Microsoft ready to discuss RSS security
Microsoft will be taking a closer look at the security of a new Web publishing technology it plans to integrate into the next major version of Windows, code-named Longhorn. [more]
Thursday, 30 June 2005, 10:55 AM CET

Security fears over medical database
Electronic records pose greater threat than ID cards, BMA told. [more]
Thursday, 30 June 2005, 10:54 AM CET

Norwegian posts crack for Google video software
It took only a day for this experienced hacker to crack Google's new video viewer. [more]
Thursday, 30 June 2005, 3:33 AM CET

Microsoft helps Japan's cybercops
Microsoft Corp. is providing Japan's National Police Agency (NPA) with early warnings about security threats. [more]
Thursday, 30 June 2005, 3:21 AM CET

Open source hides secret data
The art of hiding information from anyone except from the intended receiver has been used for many centuries. [more]
Thursday, 30 June 2005, 3:12 AM CET

India to tighten data-secrecy laws
India will tighten laws to prevent cyber crimes and ensure data secrecy after a call center employee allegedly sold personal data on 1,000 British customers, an official said Wednesday. [more]
Thursday, 30 June 2005, 3:03 AM CET

Bluetooth backers offer security tips
Users of the wireless technology are urged to take precautions to avoid attacks. [more]
Thursday, 30 June 2005, 2:40 AM CET

How to deal with pushy security vendors
I find myself feeling disturbed this month. Why? Because of security vendors that don't know how to tone down the hype. [more]
Thursday, 30 June 2005, 2:32 AM CET

Co-operating with the internet police
National Hi-Tech Crime Unit chief Sharon Lemon aims to work with businesses and IT vendors. [more]
Thursday, 30 June 2005, 2:13 AM CET

Anti-spyware market to rocket
The corporate anti-spyware market is predicted to explode over the next four years extending to more than 540m seats in 2009, a 30-fold increase from an estimated 16m seats in 2005, according to a study by analysts the Radicati Group published this week. [more]
Thursday, 30 June 2005, 1:33 AM CET

For better security, keep an eye on ActiveX
You probably have encountered ActiveX controls on the Internet. Web pages that play music probably use them. ActiveX controls also can open Windows Media movies or Microsoft Word documents inside a browser window. [more]
Thursday, 30 June 2005, 1:15 AM CET

Security features on MPEG decoder prevent piracy
To prevent the piracy of digital broadcasts on pay television, NEC Electronics America, Inc. rolled out a single-chip MPEG decoder with enhanced security features for digital set-top boxes (STBs). [more]
Thursday, 30 June 2005, 1:09 AM CET

Smart handhelds are dumb security risk
Nearly half of UK businesses do not secure smart handheld devices to the same high level they secure laptop computers. [more]
Wednesday, 29 June 2005, 4:22 AM CET

Linux security defined
A system running Linux is highly versatile and can be made as secure as a system running UNIX. [more]
Wednesday, 29 June 2005, 3:47 AM CET

Trial for German Sasser writer begins next Tuesday
Plenty of eyeballs will be scouring the 'Net next Tuesday to learn more about the fate of Sven Jaschan. [more]
Wednesday, 29 June 2005, 3:34 AM CET

Xen developers focus on security
Enhanced virtual desktop could protect remote consumer transactions. [more]
Wednesday, 29 June 2005, 3:21 AM CET

Denial of Service attacks: "smurfing"
This article provides good information on what a Denial of Service (DoS) attack is and why they can be so harmful to networks and sites on the Internet. [more]
Wednesday, 29 June 2005, 3:06 AM CET

Cybercriminals get a 10-year jail sentence
Two men have been sentenced to a total of 10 years in prison for their roles in a wide range of online fraud activities, U.K. authorities said this week. [more]
Wednesday, 29 June 2005, 2:42 AM CET

NASA hacker jailed
A US man was jailed for four months last week after he was convicted of hacking into US government computers and defacing web sites. [more]
Wednesday, 29 June 2005, 2:30 AM CET

HP introduces biometric laptop
The new notebook PC includes a fingerprint sensor. [more]
Wednesday, 29 June 2005, 2:21 AM CET

Pope worm turns nasty
'Conspiracy theory' about death of John Paul II lures unsuspecting users. [more]
Wednesday, 29 June 2005, 2:03 AM CET

Security vendors respond to heightened concerns
CA adds firewall, other vendors offer updates. [more]
Wednesday, 29 June 2005, 1:39 AM CET

Adware firm 180solutions in image makeover
Adware maker 180solutions has embarked on an image makeover with a campaign to notify users that its software is installed on their systems and tips on removing its software. [more]
Wednesday, 29 June 2005, 1:19 AM CET

Security execs: under pressure and under prepared
A new survey of corporate security executives shows that their jobs are more difficult to handle than just a year ago, and they're not prepared to handle some significant security issues. [more]
Wednesday, 29 June 2005, 1:12 AM CET

RSS: safe at any feed?
When Microsoft laid out its plans last week for building RSS into Longhorn, it didn't say anything about how it might secure the automated feeds. [more]
Tuesday, 28 June 2005, 8:14 AM CET

Where's the threat?
As consultants, seeing one client who recognizes the importance of security, regardless of their size, is vilifying. [more]
Tuesday, 28 June 2005, 8:11 AM CET

Protecting the numbers
E-commerce is buried beneath a blanket of fear. Online purchases, according to some observers, are down by nearly half; Internet banking by nearly a third. [more]
Tuesday, 28 June 2005, 8:09 AM CET

Encrypt data or invite disaster
In today’s workplace, stealing information doesn’t require a covert Special Forces team. [more]
Tuesday, 28 June 2005, 8:09 AM CET

U.S. officials: Information sharing key to security
IT should be an important consideration when reforming U.S. intelligence systems, according to a government report. [more]
Tuesday, 28 June 2005, 8:04 AM CET

CA buys firewall developer Tiny Software

CA buys firewall developer Tiny Software [more]
Tuesday, 28 June 2005, 3:33 AM CET

Privacy fears prompt CVS to turn off online service
Drugstore chain CVS Corp. has temporarily disabled a feature on its Web site after concerns were raised that unauthorized persons could improperly obtain customer-purchase records via e-mail. [more]
Tuesday, 28 June 2005, 3:27 AM CET

Cybersecurity group spreads to Europe
CSIA works on issues such as privacy and information integrity. [more]
Tuesday, 28 June 2005, 3:21 AM CET

Feds face deadlines on smart ID cards
Plans due this week; technical issues, coordination pose hurdles for agencies. [more]
Tuesday, 28 June 2005, 3:07 AM CET

Porn spam on the rise again
Inboxes sizzle as junk mailers resurrect the old scams. [more]
Tuesday, 28 June 2005, 2:55 AM CET

Security worries Net users
US consumers are more concerned about identity theft and the security of online commerce in the wake of recent data breaches, say surveys released last week. [more]
Tuesday, 28 June 2005, 2:50 AM CET

When good security goes bad
You've installed all the right hardware, and so your network is safe, right? Wrong! Too many administrators have found out that security is about more than hardware alone. Here's what to do when good security goes bad. [more]
Tuesday, 28 June 2005, 2:47 AM CET

Browser identification for web applications
This paper outlines techniques that allow users to determine client browser types remotely. [more]
Monday, 27 June 2005, 5:42 PM CET

eSecurity management comes of age
To keep pace with increasing complexity in enterprise business operations, the related information security processes and technologies have evolved into a reliable, mature system. [more]
Monday, 27 June 2005, 5:24 PM CET

Users want pragmatic security rules
The massive scope of the CardSystems Solutions security breach earlier this month is likely to fuel even more calls for new data-protection regulations and tougher enforcement of existing ones, security managers said last week. [more]
Monday, 27 June 2005, 5:22 PM CET

Aussies prosecute first 'spammer'
Australia is prosecuting the first alleged spammer under its new-ish Spam Act. [more]
Monday, 27 June 2005, 5:18 PM CET

Adoption of alternate e-mail security technologies pushed
"Each protocol provides different answers to different problems involving e-mail security issues. But both new protocols deal with sender authentication," Thomas Gillis, senior vice president for worldwide marketing at IronPort Systems, said. [more]
Monday, 27 June 2005, 5:15 PM CET

Homeland security CIO must build authority
President Bush last week tapped Agriculture Department CIO Scott Charbo for the top IT position at the Department of Homeland Security, a job rife with organizational and technological challenges. [more]
Monday, 27 June 2005, 5:13 PM CET

Understanding continuous data protection
A critical element of total backup systems, CDP products can help you find that needle in your data haystack. More importantly, they offer restoration capabilities that tape, replication and snapshot technologies lack. [more]
Monday, 27 June 2005, 5:12 PM CET

What is spyware? The industry can't agree
Many anti-spyware programs scour computer hard drives for those data-tracking files called cookies that we often get from Web visits. [more]
Monday, 27 June 2005, 5:09 PM CET

They welcome wireless spam?
Wireless carriers will have to fortify their defenses in the battle against text-messaging spam or eventually risk a customer revolt, industry watchers say. [more]
Monday, 27 June 2005, 5:08 PM CET

UK to outsource biometric visa checks to Mumbai
The UK is to outsource visa application checks "wherever there is an outsource partner", following trials in its largest visa posts in Mumbai, Delhi and Islamabad. [more]
Monday, 27 June 2005, 5:05 PM CET

Targeted attacks pose new security challenge
Targeted hacker attacks, such as the one believed to have caused the massive credit card security breach disclosed this month, are low tech and well understood. [more]
Monday, 27 June 2005, 5:01 PM CET

UK ID cards costs go up
The government's proposals for ID cards are under fire today from the London School of Economics which estimates the scheme could cost twice as much as the government claims. [more]
Monday, 27 June 2005, 4:51 PM CET

German tech university offers summer hacking course
Summer school gives researchers opportunity to explore intrusion techniques. [more]
Monday, 27 June 2005, 4:50 PM CET

Businesses and civil servants put on security alert
Government security chief issues warning over Trojan email attacks. [more]
Friday, 24 June 2005, 4:08 AM CET

Moving ahead with data security
How does your company enforce data security? I bet most of your answers will involve procedures based on host applications that have varying degrees of sophistication, depending on how much is at stake with a security breach. [more]
Friday, 24 June 2005, 3:47 AM CET

Hotmail takes a tougher stance on spam
Microsoft sidelining incoming mail when it fails to pass Sender ID check. [more]
Friday, 24 June 2005, 3:24 AM CET

Pulling the covers off Linux PAM
A hidden jewel -- or pain in the rear, depending on your perspective -- is Linux PAM (Pluggable Authentication Module). [more]
Friday, 24 June 2005, 3:04 AM CET

AT&T plans CNN-syle security channel
Video streaming service will carry Internet security news 24/7. [more]
Friday, 24 June 2005, 2:39 AM CET

US security alliance comes to Europe
The Cyber Security Industry Alliance (CSIA), a US lobby group of IT security firms, is opening European operations today. [more]
Friday, 24 June 2005, 2:22 AM CET

Japan nuclear data leak raises security concerns
Japanese officials scrambled on Thursday to contain the public relations fallout from reports that confidential information about Japan's nuclear plants had leaked onto the Internet through a virus on a personal computer. [more]
Friday, 24 June 2005, 2:09 AM CET

Moving ahead with data security
Vendors at all levels begin to focus on storage-specific data protection. [more]
Friday, 24 June 2005, 2:03 AM CET

Phishing threatens online confidence
Phishing attacks have increased by 28 per cent in the past 12 months, according to research published this week. [more]
Friday, 24 June 2005, 1:40 AM CET

Banks urged to check up on offshore security
Financial institutions must make sure their offshore outsource suppliers are free of criminal gangs working in them. [more]
Friday, 24 June 2005, 1:18 AM CET

Hacker boot camp helps good guys outsmart troublemakers
The number of IT security professionals is expected to grow to nearly 800,000 by 2008, and more of them need to think like hackers to be effective. [more]
Friday, 24 June 2005, 12:57 AM CET

Internal hackers pose the greatest threat
Beware the enemy within. [more]
Friday, 24 June 2005, 12:28 AM CET

Book review: Silence on the wire
While looking for some interesting read for the summer, I’ve stumbled across a book written by Michal Zalewski named “Silence on the wire: a field guide to passive reconnaissance and indirect attacks”, from No Starch Press. [more]
Friday, 24 June 2005, 12:10 AM CET

Hackers are real-time. Are you?
To meet the SOX general IT security requirements, organizations need to deploy multiple security point solutions such as firewalls, intrusion detection systems, anti-virus systems and others. [more]
Thursday, 23 June 2005, 7:36 PM CET

Common security problems in the code of dynamic web applications
The majority of occurring software security holes in web applications may be sorted into just two categories: Failure to deal with metacharacters, and authorization problems due to giving too much trust in input. This article gives several examples from both categories, and then adds some from other categories as well. [more]
Thursday, 23 June 2005, 1:48 PM CET

Advertising for help can showcase security weaknesses
Wonder how hackers know where your company's network is vulnerable? [more]
Thursday, 23 June 2005, 9:17 AM CET

10 top tips for mobile security
We explore 10 on-the-road scenarios to test your security savvy, then provide tips for each one to be sure your mobile data is safe. [more]
Thursday, 23 June 2005, 9:13 AM CET

Calif. lawmakers back tougher ID theft law
The new bill focuses on paper and backup tape records. [more]
Thursday, 23 June 2005, 9:12 AM CET

Review: PGP's PGP Desktop Professional 9.0
The latest version of PGP Desktop lets you encrypt an entire hard disk, create secured virtual disks and work with select smart cards. [more]
Thursday, 23 June 2005, 9:10 AM CET

Microsoft won't patch IE spoofing bug (or is it a feature?)
Hours after word broke that most browsers were vulnerable to a spoofing flaw that phishers could use to pilfer confidential data, Microsoft has declined to issue a security update. [more]
Thursday, 23 June 2005, 9:09 AM CET

DShield - a community approach to intrusion detection
Analyzing firewall logs is key to understanding the threats your servers face. [more]
Thursday, 23 June 2005, 9:03 AM CET

ID thieves search ultimate pot of gold — databases
Thieves who supply online criminals with stolen IDs are increasingly going for the big score: stealing directly from banking-transaction databases. [more]
Thursday, 23 June 2005, 9:01 AM CET

UK becoming ‘a haven for e-criminals’
Research revealed to Times Online accuses the Government of failing to address computer crime. [more]
Thursday, 23 June 2005, 8:52 AM CET

7 security mistakes companies make
This article presents seven of the most significant ones. [more]
Thursday, 23 June 2005, 8:51 AM CET

The latest hacker challenge: security software
Bored hackers plus complacent vendors equal a recipe for trouble, as security software exploits continue to mount. [more]
Thursday, 23 June 2005, 8:35 AM CET

How much encryption is 'enough' for VoIP?
While we agree that there is doubtlessly a need for an extremely secure infrastructure when implementing VoIP, we remain a bit puzzled as to why people think they need to encrypt the content of the conversation itself. [more]
Thursday, 23 June 2005, 8:33 AM CET

Internal security attacks affecting banks
Internal security breaches at the world's banks are growing faster than external attacks, as institutions invest in technology, instead of employee training. [more]
Thursday, 23 June 2005, 8:32 AM CET

Phishing: an interesting twist on a common scam
During this penetration test, there were several interesting findings, but we are going to focus on one that would knock the wind out of anyone responsible for the security of online systems. Particularly if you are in the business of money. [more]
Wednesday, 22 June 2005, 2:46 PM CET

The secure way to beat cyber crime
IT security must be an everyday activity. [more]
Wednesday, 22 June 2005, 2:44 PM CET

Microsoft to sell antivirus software separately
Microsoft Tuesday completed its acquisition of antivirus software vendor Sybari Software with the decision to continue selling Sybari's products on a stand-alone basis. [more]
Wednesday, 22 June 2005, 10:04 AM CET

Mobile worms won't show until 2007
Mobile phone and PDA users have more than two years to get ready for a quick-spreading worm, security research analysts said as they poked holes in anti-virus vendors' hype about the immediate need for defenses. [more]
Wednesday, 22 June 2005, 10:03 AM CET

Microsoft issues Windows Server 2003 update blocking tool
Automatic downloads of service pack to be prevented. [more]
Wednesday, 22 June 2005, 9:59 AM CET

Driving Big Brother
The government plans to release new rules for controversial car black boxes this summer, according to a spokesman for the National Highway Traffic Safety Administration. [more]
Wednesday, 22 June 2005, 9:53 AM CET

Evaluating a new security policy
In this article, I will explain how to evaluate a new security policy in a safe and responsible manner. [more]
Wednesday, 22 June 2005, 2:26 AM CET

Unauthorised research opened door to MasterCard breach
The head of the card processing firm blamed for a security breach affecting anything up to 40m credit card numbers has admitted it wasn't supposed to hold the compromised data. [more]
Wednesday, 22 June 2005, 2:14 AM CET

Adobe falls through XML flaw
Bug could allow hacker to find files held locally on a PC. [more]
Wednesday, 22 June 2005, 1:25 AM CET

Companies not keeping up with network security needs
Vernier President and CEO Simon Khalaf said that the survey revealed some "shocking" findings about companies' knowledge level about internal network security. [more]
Wednesday, 22 June 2005, 1:12 AM CET

Patch and patch again to beat new wave of Trojans
Banks have moved to strengthen their perimeter security following government warnings that businesses are at risk from a new wave of e-mail Trojans. [more]
Tuesday, 21 June 2005, 11:39 AM CET

Seagate preps hard-disk encryption technology
Next year Seagate will start shipping a security technology for some of its hard-disk drives that will make life more difficult for notebook PC thieves to read stolen data. [more]
Tuesday, 21 June 2005, 11:38 AM CET

Denial of Service (DoS) attacks
DoS attacks are performed for fun, pleasure, or even financial gain. [more]
Tuesday, 21 June 2005, 11:37 AM CET

E-mail security vendors look beyond spam
With spam blocking becoming a checklist item for network managers, anti-spam companies are developing complementary features and turning to new ways to deliver their technology with hopes of distinguishing themselves in this heavily crowded market. [more]
Tuesday, 21 June 2005, 11:32 AM CET

CardSystems: shouldn't have kept records
The head of the credit card processing company whose computer system was breached by hackers, exposing millions of credit card accounts, has acknowledged that his firm should not have been keeping the consumer records in the first place. [more]
Tuesday, 21 June 2005, 11:31 AM CET

Security products 'riddled' with bugs
The number of flaws in computer security products is rising sharply and threatens to become more of a problem than vulnerabilities in the products they are designed to protect, a study by Yankee Group out Monday warns. [more]
Tuesday, 21 June 2005, 11:29 AM CET

Hackers thinking small
A recent computer security breach that left 40 million credit cards vulnerable to fraud shows how online criminals are scoring big by thinking small, experts say. [more]
Tuesday, 21 June 2005, 11:28 AM CET

Banks to spend more on IT security, survey says
Investment in security has topped the banking sector's IT spending priority list for 2005, a study by the Info-Tech Research Group revealed. [more]
Tuesday, 21 June 2005, 11:14 AM CET

Standards group raises bar on VoIP security
The Voice over IP Security Alliance (VoIPSA) has formed a working group to set security standards for new VoIP products. [more]
Tuesday, 21 June 2005, 11:12 AM CET

Security risks associated with portable storage devices
There is no question that USB Flash Drives and their electronic counterparts are a valuable addition to the road warrior's toolbox. They have also created a nightmare for data security managers and have spawned an entire sub industry that is aimed squarely at portable data storage security. [more]
Monday, 20 June 2005, 4:22 PM CET

New security measures coming online to safeguard accounts
Moving beyond usernames and passwords, banks consider better authentication software, physical tokens. [more]
Monday, 20 June 2005, 3:41 PM CET

Visa IT unit CTO discusses open systems and security
David Allen, chief technology officer at Visa International Inc.'s IT unit, has recently overseen the opening of a new 70,000-square-foot data center and the rollout of an upgrade to its global antifraud system. [more]
Monday, 20 June 2005, 3:39 PM CET

Hackers for hire
Bringing in ethical hacker consultants is the latest in security defense. [more]
Monday, 20 June 2005, 1:03 PM CET

Phishing and pharming the feds
GAO report says more needs to be done to protect government from cybersecurity risks, but most agencies fail to report threats consistently. [more]
Monday, 20 June 2005, 1:01 PM CET

IT and physical security joining hands
Departments must work together to secure enterprises, executives tell conference. [more]
Monday, 20 June 2005, 12:57 PM CET

The desktop is the best place to stop spyware
Today, companies face a major challenge in deciphering which of the latest anti-spyware solutions truly offers protection. [more]
Monday, 20 June 2005, 12:53 PM CET

Most identity theft cases never get resolved
Once a fairly infrequent occurrence, assaults on identities are coming now in waves, and from all corners. [more]
Monday, 20 June 2005, 12:32 PM CET

Microsoft: online security needs global cooperation
A Microsoft security expert is calling for greater international collaboration, including increased technical and training support for law enforcement agencies, to seriously combat cyber crime. [more]
Monday, 20 June 2005, 12:28 PM CET

Security's starring role in Oracle's 10g DB
Eighteen months after its grid computing Database 10g product took to the streets with a fervor, Oracle is pounding the pavement again with the second release of the software. [more]
Monday, 20 June 2005, 12:26 PM CET

Security breach hits 40 million credit card holders
MasterCard International has reported what could the word's biggest ever identity theft. [more]
Monday, 20 June 2005, 12:24 PM CET

Phishers look to net small fry
Online fraudsters have started targeting smaller banks and credit unions in hopes of fooling a larger percentage of customers, according to groups that monitor phishing activity. [more]
Friday, 17 June 2005, 9:56 AM CET

Most want government to make Internet safe
Most Americans believe the government should do more to make the Internet safe, but they don't trust the federal institutions that are largely responsible for creating and enforcing laws online, a new industry survey says. [more]
Friday, 17 June 2005, 9:52 AM CET

Attackers hit Canadian credit bureau
Hackers have hit one of Canada's major credit bureaus. [more]
Friday, 17 June 2005, 9:50 AM CET

Corporates focus on basics for IT security defences
IT departments in large organizations still see firewalls, intrusion detection and prevention, and anti-virus software as priority security defences despite recent hype about newer more exotic security technologies and threats, according to a survey by analysts Gartner. [more]
Friday, 17 June 2005, 9:48 AM CET

The high costs of hacking
One fixture of computer break-in stories is the estimated cost of these crimes. [more]
Friday, 17 June 2005, 7:39 AM CET

Distributed wireless security monitors
We performed an exhaustive review of these specialized overlay systems that provide wire-side and wireless rogue-device detection, RF interference and intrusion-detection capabilities as well as user and performance monitoring in the 2.4-GHz and 5-GHz ranges. [more]
Friday, 17 June 2005, 7:38 AM CET

Hardening Linux: a 10 step approach
This list of steps is intended as a guideline with a practical approach. [more]
Friday, 17 June 2005, 7:36 AM CET

Britain warns of e-mail attacks
"We have never seen anything like this in terms of the industrial scale of this series of attacks," NISCC Director Roger Cumming said. "This is not a few hackers sitting in their bedroom trying to steal bank account details from individuals." [more]
Friday, 17 June 2005, 7:35 AM CET

GAO says U.S. agencies unprepared to fight cyberthreats
A majority of them aren't ready to combat phishing, spam and spyware. [more]
Friday, 17 June 2005, 2:54 AM CET

Major spam purveyor agrees to pay settlement
Defendant will pay nearly $500,000 to settle charges he caused $5.9 million in consumer injury with spam schemes involving anti-aging and weight-loss products. [more]
Friday, 17 June 2005, 2:40 AM CET

AOL: we're not zombie haven
America Online hosts more denial-of-service (DoS) spewing zombie PCs than any other ISP in the world, a report released Tuesday claimed. AOL thinks that's just fine. [more]
Friday, 17 June 2005, 2:10 AM CET

Case of a wireless hack
This is a short story about using a couple of computers, some interesting tools, an operating system and a bit of thinking to solve a not-entirely-artificial problem of getting wireless internet access where measureas are in place to stop it. [more]
Friday, 17 June 2005, 2:00 AM CET

CompTIA: threat grows from browser-based attacks
Browser-based attacks such as "pharming" scams rose significantly for the third straight year, making them the fastest-growing security threat. [more]
Friday, 17 June 2005, 1:44 AM CET

AOL branded most infected network
ISP accused of hosting more zombie PCs than any other network. [more]
Friday, 17 June 2005, 1:30 AM CET

The Liberty Alliance Project goes after phishers
The Liberty Alliance Project, working on XML-based specifications for federated identity, is extending its remit to tackle the threat to digital identity posed by phishing. [more]
Friday, 17 June 2005, 1:20 AM CET

(IN)SECURE Magazine issue 2 has been released
(IN)SECURE Magazine is a freely available, freely distributable digital security magazine in PDF format. Get your copy of the second issue today! [more]
Thursday, 16 June 2005, 4:15 PM CET

Securing storage: complete data erasure on storage systems
When storage systems are upgraded companies often delete the data from the disks and forget about it. However, there is a tremendous amount of critical, confidential, and competitive information on those disks that cannot be completely erased by just pressing a delete button. This exposes competitive intelligence, increases vulnerability to industrial espionage and litigation. [more]
Thursday, 16 June 2005, 12:59 PM CET

Compliance regs put bite in wireless security
Sarbanes-Oxley and HIPAA mean a new focus on wireless network security. [more]
Thursday, 16 June 2005, 12:31 PM CET

Secure your laptop
Hundreds of thousands of laptops are stolen or simply forgotten each year. [more]
Thursday, 16 June 2005, 12:31 PM CET

Online banking will lose edge if security fails
Customer fears holding back internet banking says Forrester. [more]
Thursday, 16 June 2005, 12:19 PM CET

Home working deemed 'too risky'
Potential security threats outweigh productivity benefits, say IT directors. [more]
Thursday, 16 June 2005, 12:17 PM CET

Securing against the threat of Instant Messengers
Unsecured IM client installations are placing enterprise systems at risk to hackers, viruses, worms, Trojans, legal liability and violation of privacy laws. [more]
Thursday, 16 June 2005, 12:13 PM CET

Threat grows from browser-based attacks
Survey says security officers are concerned with "pharming" and other practices. [more]
Thursday, 16 June 2005, 3:22 AM CET

Hashing exploit threatens digital security
Cryptographers have found a way to snip a digital signature from one document and attach it to a fraudulent document without invalidating the signature and giving the fraud away. [more]
Thursday, 16 June 2005, 3:12 AM CET

CA, IBM and Oracle: we're checking IDs
Computer Associates, IBM and Oracle announced upgraded applications in their respective access and identity management product suites. [more]
Thursday, 16 June 2005, 3:02 AM CET

Secure computing eases security incident reporting
In the spirit of making things simpler, Secure Computing on Monday shipped new integrated security-incident reporting software. [more]
Thursday, 16 June 2005, 2:53 AM CET

Trend Micro buys IP filtering company
It plans to add features acquired with Kelkea Inc. to its IT security products. [more]
Thursday, 16 June 2005, 2:34 AM CET

Stealthy Trojan horses, modular bot software dodging defenses
Software attack tools that turn PCs into remotely controlled zombies are getting better, but defenses are not keeping up, say security experts. [more]
Thursday, 16 June 2005, 2:13 AM CET

Top open-source security applications
According to most security professionals, a top-tier, open-source security tool must have sufficient history to allow a practitioner to use it with confidence. [more]
Thursday, 16 June 2005, 1:57 AM CET

Congress must deal with ID theft
A series of Senate hearings this week examines the growing problem of identity theft. Here's what should be done to stop the scourge. [more]
Thursday, 16 June 2005, 1:43 AM CET

Data losses push businesses to encrypt backup tapes
The loss of personal data of millions of consumers is prompting companies to embrace security technology they have neglected. [more]
Wednesday, 15 June 2005, 5:35 AM CET

Interpreting 'access' and 'authorization' in computer misuse statutes
No one knows what it means to access a computer, however, nor when access becomes unauthorized. [more]
Wednesday, 15 June 2005, 5:18 AM CET

Is IPsec on borrowed time?
The trouble with IPsec is that it gets overly complicated and expensive to manage as the user base expands. [more]
Wednesday, 15 June 2005, 5:10 AM CET

Hiring hackers as security consultants
The subject of whether it is ethical to use former hackers to evaluate a network’s security is a topic that is often hotly debated. In this article, I will explore the pros and cons of using former hackers in such roles. [more]
Wednesday, 15 June 2005, 4:27 AM CET

Nokia downplays mobile virus threat
'Unlikely to pose an immediate danger', claims handset giant. [more]
Wednesday, 15 June 2005, 3:24 AM CET

Phishing attacks show sixfold increase this year
Since the start of the year, phishing attacks - fake E-mails designed to lure unsuspecting victims into giving up valuable personal information - have increased more than sixfold. [more]
Wednesday, 15 June 2005, 3:11 AM CET

Visa USA adds tool to its credit card antifraud arsenal
Aiming to reduce credit card fraud, Visa USA Inc. has launched a security tool that allows merchants to instantly check transactions in stores or online, so they can identify fraud before a transaction is completed. [more]
Wednesday, 15 June 2005, 2:50 AM CET

Testing security with hping
hping is based on the ping utility, but the two applications are used in different ways. [more]
Wednesday, 15 June 2005, 2:39 AM CET

Microsoft looks to refine security blueprint
Microsoft last week detailed a multi-year plan to tie together its security and access protection technologies into a policy-based network model intended to secure distributed computing. [more]
Wednesday, 15 June 2005, 2:27 AM CET

Shred it!
The second worst thing you can do in the face of a government investigation is to destroy the documents relevant to that investigation. The worst thing you can do, of course, is to almost destroy these documents. [more]
Wednesday, 15 June 2005, 2:11 AM CET

Law and the spyware plague
After a U.S. Senate hearing earlier this month, one senator was quoted as likening spyware to "somebody walking around your house, kind of invisibly." The analogy was inadequate. [more]
Wednesday, 15 June 2005, 2:01 AM CET

Two cases of lost data shine light on risks
A pair of recent security breaches shows that data loss can happen in many different ways for just about any reason. [more]
Wednesday, 15 June 2005, 1:44 AM CET

Security demands multiple strategies
There are three ways to sell security effectively, whether you're in the business of selling security or an I.T. manager trying to convince upper management to spend money on security. [more]
Wednesday, 15 June 2005, 1:35 AM CET

Mobile & Wireless World to focus on Wi-Fi, security, RFID
When it comes to mobile and wireless technology, what keeps a CIO up at night? [more]
Tuesday, 14 June 2005, 4:38 AM CET

RSS to carry spyware before end of year
By the end of the year, spyware programs will have tripled in number, put Firefox in their sights, and have turned to RSS to distribute its key loggers and ad spawners, a security expert said Friday. [more]
Tuesday, 14 June 2005, 4:18 AM CET

HP ProCurve boosts security
Vendor adds four new higher-end products and upgrades to its high-end networking series. [more]
Tuesday, 14 June 2005, 3:50 AM CET

Skulls Trojan poses as security code
Virus writers have created mobile phone malware that poses as a pirated copy of F-Secure's mobile anti-virus software. [more]
Tuesday, 14 June 2005, 3:43 AM CET

Army to look at beefing up security along Global Information Grid
The Joint Task Force for Global Network Operations will unveil a document next week that looks at improving the way users manage and defend the Global Information Grid, the Defense Department's classified and unclassified network. [more]
Tuesday, 14 June 2005, 3:37 AM CET

US expected to abandon Biometric passport plan
Rules requiring Irish citizens to carry high-tech passports when visiting the US are to be dropped because the technology behind the scheme is seen as unreliable. [more]
Tuesday, 14 June 2005, 3:23 AM CET

Intrusion Protection Systems get hot
Web services and internal threats become a new focus. [more]
Tuesday, 14 June 2005, 2:55 AM CET

Invisible encryption
Why didn't this happen sooner? Seagate Technology has just announced a hard disk drive for laptops and other mobile devices that automatically encrypts all data as it goes into and comes out of the drive. [more]
Tuesday, 14 June 2005, 2:49 AM CET

Consumers clueless about IT security
Despite a proliferation in internet use, consumer PC owners remain dangerously unaware of the threats posed by hackers and viruses, industry experts warned today. [more]
Tuesday, 14 June 2005, 2:30 AM CET

Virus flood threatens home users
Virus writers have adopted a new tactic to try to make sure their malicious programs reach as many victims as possible. [more]
Tuesday, 14 June 2005, 2:10 AM CET

Japanese 'Yahoo! phisher' arrested
Japanese police today arrested a man from Osaka who allegedly ran an Internet phishing scam based around a site called Yafoo. [more]
Tuesday, 14 June 2005, 1:32 AM CET

Virus-safe computing
Want to know why we can't rid ourselves of viruses? [more]
Tuesday, 14 June 2005, 1:26 AM CET

Security chip to limit OS X to Macs
Apple looking to keep operating system from running on third-party hardware. [more]
Monday, 13 June 2005, 2:34 PM CET

Not all agree on 'overhyped' security threats
Two Gartner analysts released their list of the five most overhyped IT security threats, with IP telephony and malware for mobile devices making the list, but not all IT security vendors agreed with the analysts' assessment. [more]
Monday, 13 June 2005, 2:30 PM CET

Why standards are important for wireless security
Industry standards play a critical role in research and development, product development and marketing initiatives, which in turn help organizations meet their business objectives. [more]
Monday, 13 June 2005, 2:29 PM CET

Cisco packs security products together
Cisco Systems last week introduced software that ties together a variety of its security products so service providers can offer more-effective protection against DDoS attacks. [more]
Monday, 13 June 2005, 2:24 PM CET

Outsourced security called battle tested
Outsourcing corporate security is no longer risky business and large organizations should hand off network monitoring and security services as soon as possible. [more]
Monday, 13 June 2005, 2:23 PM CET

Spam sign-up man convicted of harassment
A US man who signed his boss up to various spam lists has been convicted of harassment. [more]
Monday, 13 June 2005, 2:21 PM CET

Dear sir: your data was stolen
Millions of tales of potential identity theft are circulating in the digital city. Mine is just one of them. [more]
Monday, 13 June 2005, 2:18 PM CET

Xen aims to increase security in open source software
Virtualisation engine sets out to secure open source. [more]
Monday, 13 June 2005, 2:09 PM CET

Motorola downplays data security breach
A pair of computers containing personal information on Motorola workers stolen from the office of a third party contractor has sparked a minor security flap. [more]
Monday, 13 June 2005, 2:08 PM CET

RSA eases security development
RSA Security Inc. has unveiled its BSafe Data Security Manager, which lets security professionals determine the sensitivity of company data and automatically builds the necessary protection capabilities into applications during the development process. [more]
Monday, 13 June 2005, 2:06 PM CET

The key to compliance
By ensuring regulatory compliance and at the same time reducing IT costs, secure enterprise provisioning solutions are sure to evolve from the great opportunity they currently present to a critical element of the IT infrastructure of successful businesses. [more]
Monday, 13 June 2005, 1:47 PM CET

Understanding the Web proxy and firewall client automatic configuration
In this article we will explore how the ISA Server 2004 Web Proxy and Firewall Client Automatic Configuration really works from a client point of view. [more]
Monday, 13 June 2005, 2:01 AM CET

Security in Windows Mobile 5.0 messaging pack disappoints
Windows Mobile 5.0 Messaging and Security Feature Pack (MSFP) does not go far enough with security for enterprisewide deployment. [more]
Monday, 13 June 2005, 1:22 AM CET

Microsoft warns on security fixes
Microsoft has issued an alert about a bumper package of security updates for Windows. [more]
Friday, 10 June 2005, 1:30 PM CET

Computer viruses become hacker informants
vAn emerging breed of computer virus that keeps hackers informed about the latest weaknesses in computer networks has been discovered by security experts. [more]
Friday, 10 June 2005, 11:02 AM CET

"We think like hackers" - Microsoft
Reports from TechEd, Microsoft's geek fest say that much of what's going on is around security. [more]
Friday, 10 June 2005, 11:01 AM CET

Integrating and securing Linux without a silver bullet
There is no silver bullet for dealing with dynamic Linux issues, but in this tip, author Peter Harrison offers sage advice for Linux security and integration. [more]
Friday, 10 June 2005, 3:02 AM CET

Spyware probe PI in hospital after fall
A key suspect in a spyware-linked industrial espionage case was severely injured after falling down a stairwell on Wednesday during a break in questioning by Israeli police. [more]
Friday, 10 June 2005, 1:44 AM CET

Microsoft fixes Hotmail hack
Malicious web page closed down as Redmond investigates. [more]
Friday, 10 June 2005, 1:02 AM CET

Code signing: is it a security feature?
In this article, we’ll take a look at how code signing works and where it fits into your organization’s security plan. [more]
Friday, 10 June 2005, 12:18 AM CET

Bulletin board hoster loses postings in hacker attack
Ezboard, a hosting service to hundreds of thousands of online bulletin boards, suffered a hacker attack on Memorial Day that permanently erased countless postings. [more]
Thursday, 9 June 2005, 1:52 PM CET

Even taxi cabs are worried about consumer data security
TNS, a credit card payment service provider, has begun encrypting consumer data passing across wireless networks. [more]
Thursday, 9 June 2005, 1:50 PM CET

In the future, everyone's PC will be infected for 15 minutes
Gartner research says "Warhol Worms" and four other topics comprise the five most overhyped security threats today. [more]
Thursday, 9 June 2005, 1:49 PM CET

Symantec ask court to rule as adware
Symantec has filed suit in defence of its right to produce tools that classify programs from as adware. [more]
Thursday, 9 June 2005, 1:41 PM CET

Using a network analyser as a security tool
Every administrator these days has already built strong defences against hackers and virus attacks. [more]
Thursday, 9 June 2005, 1:40 PM CET

Insecurity through obscurity
Security through obscurity is probably one of the oldest tricks in the security book. [more]
Thursday, 9 June 2005, 3:13 AM CET

What to ask when evaluating intrusion-prevention systems
An intrusion-prevention system (IPS) is part of an overall security strategy to protect your network from attack. [more]
Thursday, 9 June 2005, 2:54 AM CET

Two-thirds of firms have insufficient password security
Survey reveals IT staff are keeping passwords on post-it notes. [more]
Thursday, 9 June 2005, 2:09 AM CET

Bluetooth hack shakes mobile security
Cryptographers have discovered a security flaw in implementations of Bluetooth which allows hackers to pair their devices with prospective victims. [more]
Thursday, 9 June 2005, 1:44 AM CET

Virus phishes for victims
The creators of the Mytob virus or its variants are trying a new trick to infect people's computers — phishing. [more]
Thursday, 9 June 2005, 1:23 AM CET

GNER prints passwords in customer magazine
Train operator's mainframe security publicised in photograph. [more]
Thursday, 9 June 2005, 1:01 AM CET

AT&T's security head wears many hats
AT&T's Chief Security Information Officer Ed Amoroso recently spoke with Network World about his job heading up security for one of the largest telecom companies in the world. [more]
Wednesday, 8 June 2005, 1:39 PM CET

Banking on security
On the face of it banks face a conundrum when it comes to on-line security. [more]
Wednesday, 8 June 2005, 1:37 PM CET

ISPs found innocent of aiding zombie attacks in 'trial'
Mock trial determines that ISPs still can do more to protect users. [more]
Wednesday, 8 June 2005, 1:35 PM CET

Brit hack suspect faces extradition fight
A Briton suspected of hacking into numerous US military and NASA computers faces an extradition fight following his arrest in London on Tuesday. [more]
Wednesday, 8 June 2005, 1:34 PM CET

Seagate's drive plans include 500 GBs and encryption
Seagate Technology unveiled its 2005 lineup on Wednesday, which takes drives to the half-terabyte level and introduces a product family that encrypts data. [more]
Wednesday, 8 June 2005, 1:32 PM CET

Microsoft centralizes patch management
Microsoft CEO Stave Ballmer introduces new versions of Windows Server Update Service and Microsoft Update to make it easier for customers to find and download security patches and software updates. [more]
Wednesday, 8 June 2005, 1:30 PM CET

Paoga - an answer to the privacy problem?
Information wants to be free, as the dotcom era cliché would have it. Sadly, that is true of your private personal details as anything else. [more]
Wednesday, 8 June 2005, 1:28 PM CET

Rankin friend Duic denies hacking into RBC computer
Daniel Duic denied a lawyer's suggestion yesterday that he regularly had the opportunity to get insider information on stocks by hacking into the server at brokerage firm RBC Dominion Securities Inc. [more]
Wednesday, 8 June 2005, 1:25 PM CET

Hackers want YOU
Dave Bullard read these two books on hacking and immediately updated his computer security. [more]
Wednesday, 8 June 2005, 1:24 PM CET

Study: flaw disclosure hurts software makers' stock
Software makers stand to lose significant market value whenever a flaw is found in their products, two university researcher said in a paper published last week. [more]
Tuesday, 7 June 2005, 1:08 PM CET

Telspace research exposes peak hacker assault periods
There are specific periods when Web servers are most vulnerable to hacker attacks, says Dino Covotsos, MD and founder of IT security provider Telspace. [more]
Tuesday, 7 June 2005, 1:07 PM CET

How well do you know your partner?
This is an opinion piece with 8 helpful hints and tips on how to avoid becoming a victim of industrial espionage and malicious hackers. [more]
Tuesday, 7 June 2005, 12:33 PM CET

A tale of two hackers
Lapping up the sunshine outside a downtown cafe, Kevin Mitnick is apprehensive. [more]
Tuesday, 7 June 2005, 12:23 PM CET

Secure Mac and Linux authentication
There are several reasons I'm not a big Apple fan (high prices, blogger lawsuits etc.) but let's blame them for the right things. [more]
Tuesday, 7 June 2005, 12:19 PM CET

The true computer parasite
It is now twenty years since Fred Cohen published his seminal research paper suggesting the potential threat of computer viruses. In the years since this publication, the risk that Cohen described has unquestionably been borne out, and alongside hackers, the threat of the computer virus is the security issue that has most clearly permeated the public mind. [more]
Tuesday, 7 June 2005, 12:18 PM CET

Introducing GT4 security
In this article, you are introduced to the Grid Security Infrastructure (GSI), the security component in Globus Toolkit 4 (GT4). [more]
Tuesday, 7 June 2005, 12:17 PM CET

Tech vs. terrorism
The FBI stumbled badly in modernizing its IT to help fight terrorism. Here's how the bureau plans to get on track. [more]
Tuesday, 7 June 2005, 12:15 PM CET

Companies rush to plug 'data leaks'
The threat entails employees leaking sensitive data about customers, finances or intellectual property in violation of security policies and regulatory requirements. [more]
Tuesday, 7 June 2005, 12:12 PM CET

Microsoft's most successful failure
Someone once asked Pable Picasso which one of his many paintings was his favorite. His reply: the next one. Ask Steve Ballmer which version of Windows is the most secure and guess what his answer will be? [more]
Tuesday, 7 June 2005, 12:10 PM CET

Interview with Theo de Raadt
What's your personal point of view about Security? Almost all security problems are simply a result of poor quality. [more]
Tuesday, 7 June 2005, 11:59 AM CET

Another flaw found in Mozilla
It appears the Mozilla foundation must deal with another round of fixes to its popular browsers after a security firm pointed out that they are susceptible to a seven-year-old vulnerability that could let attackers spoof Web sites. [more]
Tuesday, 7 June 2005, 11:55 AM CET

Dirt cheap network security
Throwing money at security vulnerabilities may not make you safer at all. Follow this advice for low-cost and no-cost security measures to put your network beyond the reach of the bad guys. [more]
Tuesday, 7 June 2005, 11:52 AM CET

Wi-Fi security: leverage what you know
How do you know that you've covered all the bases when it comes to wireless LAN security? [more]
Tuesday, 7 June 2005, 11:51 AM CET

Firms warned they may be targets of Trojan spies
UK businesses should take urgent steps to check their systems are secure, police have warned after discovering one of the world's largest industrial espionage and hacking operations. [more]
Tuesday, 7 June 2005, 11:50 AM CET

Publishing secure FTP servers behind ISA Firewalls
This article discusses how to create a PASV mode FTP server or a secure FTP server which is behind ISA Server 2004. [more]
Tuesday, 7 June 2005, 11:45 AM CET

Are virus writers creating a super worm?
Recent rash of Mytob worm variant has some security experts concerned. [more]
Monday, 6 June 2005, 11:31 PM CET

Fear will keep driving security sales
Selling on fear is one way of getting an almost sure-fire sale. [more]
Monday, 6 June 2005, 11:30 PM CET

Cheaper, more secure ID system set out
Academics have proposed an alternative to the Government's plans for a national identity card scheme which they claim will be more secure, reliable, cost-effective and citizen-friendly. [more]
Monday, 6 June 2005, 11:28 PM CET

How do computer viruses work?
Computer viruses are mysterious and grab our attention. On the one hand, viruses show us how vulnerable we are. [more]
Monday, 6 June 2005, 11:28 PM CET

CA boosts biz apps' security
Computer Associates International today unveiled its eTrust Identity and Access Management Toolkit, a product targeted at helping developers build more manageable identity-based security into their business applications. [more]
Monday, 6 June 2005, 11:26 PM CET

Mytob worm disables PC security
Anti-virus software maker Sophos has issued a warning on a new type of worm that is spreading rapidly and making it difficult for users of infected systems to clean up their Windows PCs. [more]
Monday, 6 June 2005, 11:25 PM CET

Security barometer survey: the psychology of security
Elaine Axby of Quocirca presents the findings from its IT security survey which compares the perceptions and realities of common security threats in today's world. [more]
Monday, 6 June 2005, 11:23 PM CET

The art of selling security
We asked security officers to share creative methods they've used to get funding for infosec projects. [more]
Friday, 3 June 2005, 3:59 AM CET

Why your security investigation is going to fail
Walking in to a business and finding the smoldering corpse of a mishandled security investigation seems to be all too common lately. [more]
Friday, 3 June 2005, 3:28 AM CET

How savvy are you about your online security?
U.S. residents are "dangerously ignorant" of the data that Web site owners collect on them, a study shows. [more]
Friday, 3 June 2005, 2:53 AM CET

Keyboard cops
Forget leaving fingerprints at the scene of the crime. Today's police know that the hard evidence they find on your hard drive can put you behind bars. [more]
Friday, 3 June 2005, 2:09 AM CET

Companies take to the security warpath
Eric Litt, chief information security officer at General Motors, calls it "management by inclusion". [more]
Friday, 3 June 2005, 1:34 AM CET

Taking the spam fight beyond message deflection
AppRiver, Habeas, OmniTI tools protect e-mail senders and recipients. [more]
Friday, 3 June 2005, 1:21 AM CET

Time to blow spyware's cover
The need for systems and processes that root out spyware is becoming acute. [more]
Thursday, 2 June 2005, 4:39 AM CET

m-commerce security risks exposed
Vulnerabilities in mobile applications offer a way to attack otherwise secure web sites, according to independent security consultancy SecureTest. [more]
Thursday, 2 June 2005, 4:28 AM CET

Bagle virus peril in empty e-mail
Another variant of the computer virus, Bagle, has quickly been making its way across the net, say security experts. [more]
Thursday, 2 June 2005, 3:52 AM CET

Europe PCs most used in attacks
European computers are the most susceptible to exploitation by hackers looking to carry out distributed denial of service (DDoS) attacks on internet businesses, according to two reports released last week. [more]
Thursday, 2 June 2005, 3:43 AM CET

New bill proposes 10-year sentence for online fraud
Home Office gets tough on phishing. [more]
Thursday, 2 June 2005, 3:24 AM CET

Colleges reject applicants who followed hacking instructions
Stanford University's Graduate School of Business has rejected 41 applicants who tried to access an admissions Web site earlier this year in hopes of learning their fate ahead of schedule. [more]
Thursday, 2 June 2005, 3:10 AM CET

New Mytob worm poses as IT administrator
Another variant of the Mytob worm began wiggling its way into inboxes this week, enticing recipients to open an e-mail attachment that could allow a remote hacker to access and perform commands on an infected machine. [more]
Thursday, 2 June 2005, 2:57 AM CET

Network security revenues to rise 27% to $1.3 billion
Infonetics says revenues rose 5% in first quarter, will growh 15% per year between 2004 and 2008. [more]
Thursday, 2 June 2005, 2:22 AM CET

Deterrence must be the key to avoiding DDoS attacks
Computing talks to the corporate victims of a malicious distributed denial of service attack. [more]
Thursday, 2 June 2005, 1:39 AM CET

Federal Agencies to use RFID, but cite security concerns
Thirteen of the largest federal agencies are using or plan to use radio-frequency identification technology, according to a study released last week by the Government Accountability Office. [more]
Thursday, 2 June 2005, 1:06 AM CET

An Introduction to securing Linux with Apache, ProFTPd and Samba
Many machines come with default installations of Apache and Samba, and a few others even include a FTP daemon. While these services may be disabled by default, some users may be inclined to use these programs. This article is a brief, but in-depth tutorial on how to keep these applications up-to-date and secure. [more]
Wednesday, 1 June 2005, 4:21 PM CET

Spam hurts developing countries most, OECD says
Underdeveloped nations lack technology, money and knowledge to stop unwanted e-mail. [more]
Wednesday, 1 June 2005, 5:01 AM CET

Employee training & education can mitigate threats
Security isn’t only about protecting your network from external threats; it’s also about protecting against threats from within. [more]
Wednesday, 1 June 2005, 4:52 AM CET

Blank virus blanks email
A new version of the Bagle Downloader is spreading like wildfire via email, according to email filtering firm MessageLabs. [more]
Wednesday, 1 June 2005, 4:33 AM CET

Israeli police uncover Trojan industrial spy ring
The malware was allegedly used to steal corporate secrets. [more]
Wednesday, 1 June 2005, 4:10 AM CET

NEC delays quantum cryptography system
Company hoped to sell the technology later this year, but delayed it for at least three years. [more]
Wednesday, 1 June 2005, 3:52 AM CET

London couple arrested for role in large-scale industrial espionage
According to several media reports, Israeli police have revealed their findings of a large-scale industrial espionage scandal. [more]
Wednesday, 1 June 2005, 3:45 AM CET

HP stakes bid to dominate ID market
HP last week made a grab for a bigger slice of the lucrative identity market with the release of a National Identity System (NIS) based on Microsoft's .NET platform. [more]
Wednesday, 1 June 2005, 3:09 AM CET

FBI veteran to secure Microsoft
Expert to face uphill struggle? [more]
Wednesday, 1 June 2005, 2:22 AM CET

Investment bank UBS: one of our disc drives is missing
Investment bank UBS has launched an investigation after a disc reckoned to contain sensitive client data went missing. [more]
Wednesday, 1 June 2005, 2:02 AM CET

Supporting ISA Firewall networks protecting illegal top-level domains
Of all the issues in ISA firewall networking, the one that most commonly gets people hot under the collar is that of the split DNS. [more]
Wednesday, 1 June 2005, 1:34 AM CET


What can we learn from the top 10 biggest data breaches?

Posted on 21 August 2014.  |  Here's a list of the top 10 biggest data breaches of the last five years. It identifies the cause of each breach as well as the resulting financial and reputation damage suffered by each company.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.


Fri, Aug 22nd