Off the Wire

Off The Wire Archive

News items for July 2003

Computer Forensics and the Alternative OS
No longer a dark and mysterious process, computer forensics have been significantly on the scene for more than five years now. Despite this, they have only recently gained the notoriety they deserve. Expanded consciousness has also brought along the inevitable rise in self-proclaimed "experts" in the field of computer forensics. [more]
Thursday, 31 July 2003, 6:51 PM CET

Experts anxious over possible Net attack
Government and industry experts are increasingly concerned about brewing hacker activity they consider a precursor to a broad Internet attack that will target a serious flaw in Windows software from Microsoft. [more]
Thursday, 31 July 2003, 6:46 PM CET

Google opens door to hackers
Hackers no longer even need to visit a website to attack it, instead they are using information from pages cached by popular search engine Google according to a report in the New Scientist. [more]
Thursday, 31 July 2003, 6:41 PM CET

Zimmermann: Public too slow to adopt encryption
The reported use of encryption by terrorists has not shaken Philip Zimmermann’s faith in having strong encryption in the hands of the public. [more]
Thursday, 31 July 2003, 6:39 PM CET

I'm working for the FBI, claims accused hacker
Self-styled grey hat hacker Jesse Tuttle is fighting charges that he broke into his local council's computer network with a claim that he only did it as part of his work with the FBI. [more]
Thursday, 31 July 2003, 6:38 PM CET

Wireless LAN security falls short of expectations
Security is still the number one inhibitor to enterprise adoption of wireless LAN technologies. [more]
Thursday, 31 July 2003, 6:36 PM CET

Study: Bad security flaws don't die
A study of Internet security flaws showed that for serious issues, half of vulnerable systems remain unfixed after 30 days. [more]
Thursday, 31 July 2003, 6:33 PM CET

Spam dumpster diving
Anti spam activists struck gold this week when they found a website, which contains thousands of zipfiles, left behind by or nicked from a spammer. Nearly a gigabyte of email addresses, unzipped. [more]
Thursday, 31 July 2003, 6:31 PM CET

Setting up for forensics
The goal of this article is is to create a CD-ROM of forensic tools and databases for use with your systems, and also outline some methods to collect forensic evidence from hacked production systems. [more]
Wednesday, 30 July 2003, 7:52 PM CET

Secret networks protect music swappers
They are the country clubs of the file-sharing world, exclusive Internet networks that require knowing the right people and having a wealth of content on your hard disk to get into the clique. [more]
Wednesday, 30 July 2003, 7:47 PM CET

Build a wireless access point on Linux
When the ability to write and modify your own management software is the main objective, a custom-built wireless access point is the way to go. Take a look at what's involved in building a wireless bridge using Linux, including software and hardware considerations. [more]
Wednesday, 30 July 2003, 7:47 PM CET

FBI targets Net phoning
Internet telephone calls are fast becoming a national security threat that must be countered with new police wiretap rules, according to an FBI proposal presented quietly to regulators this month. [more]
Wednesday, 30 July 2003, 7:43 PM CET

Sacked staff turn to sabotage
Failure to revoke access to corporate networks could prove very costly. [more]
Wednesday, 30 July 2003, 7:42 PM CET

The leaky net - privacy on the Internet?
In everyday life, with a few simple precautions, you can keep your personal details private. [more]
Wednesday, 30 July 2003, 7:41 PM CET

Truste, IAPP join for corporate privacy push
Two prominent privacy organizations today announced a partnership to jointly deliver privacy-related education, training and certification programs for companies. [more]
Wednesday, 30 July 2003, 7:38 PM CET

Security pros talk, but can they walk?
The past two weeks have been typical of the current state of Internet security: Industry and government leaders say they're focused on improving security while flaws continue to be found and exploited. [more]
Wednesday, 30 July 2003, 7:35 PM CET

Firewall evolution - deep packet inspection
Deep Packet Inspection can be seen as the integration of Intrusion Detection (IDS) and Intrusion Prevention (IPS) capabilities with traditional stateful firewall technology. [more]
Wednesday, 30 July 2003, 7:34 PM CET

Companies lack IT security funding
The Ernst & Young Global Information Security Survey has found that 90% of organisations define protecting their information resources as a major business objective, but that this area is not allocated the appropriate funding. [more]
Wednesday, 30 July 2003, 7:27 PM CET

Interview with Michael Jang
The author of "Mastering Red Hat Linux 9" talks about his book, security and Linux in general. [more]
Wednesday, 30 July 2003, 7:15 PM CET

HP, IBM, Sun to unveil server security initiative
Hewlett-Packard, IBM, and Sun Microsystems are allying with three security providers to announce an open standards initiative for safe computing on Aug. 5. [more]
Monday, 28 July 2003, 1:49 PM CET

Verizon glitch fix is a bitch
After months, Verizon Wireless finally fixed a glitch on its network that could have allowed hackers to harvest lists of customers' phone numbers and read private text messages. Unfortunately, the fix created another problem. [more]
Monday, 28 July 2003, 1:48 PM CET

Defending your site against spam, part 2
This article is the second and final installment describing my efforts to defend my systems from spam. [more]
Monday, 28 July 2003, 1:47 PM CET

Keyser Soze's unofficial XP security pack 1.002
Keyser Soze's Unofficial XP Security Pack comprises of 90% security hotfixes & 10% critical hotfixes. [more]
Monday, 28 July 2003, 1:46 PM CET

Japan cancels national hacking contest
Japan canceled a national computer-hacking contest scheduled for next month after the government came under fire as encouraging cybercrime, a government official said Friday. [more]
Monday, 28 July 2003, 1:45 PM CET

Do security companies create monsters?
Security software companies "try to create a need for [vendor solutions]," says Frost & Sullivan security analyst Jason Wright. "That's how capitalism works." But do some go too far? [more]
Monday, 28 July 2003, 1:45 PM CET

How to tell if the RIAA wants you
A new database created by the Electronic Freedom Foundation helps file traders find out whether they've been issued a subpoena from the Recording Industry Association of America. [more]
Monday, 28 July 2003, 1:44 PM CET

Critical flaw in Windows music program
Microsoft has issued a patch for a new, critical flaw in Windows that could allow an attacker to take control of a victim's computer or run malicious programs on it, the company said. [more]
Monday, 28 July 2003, 1:43 PM CET

HNS Newsletter Issue 172 has been released
You can read the Newsletter in TXT or PDF format. If you haven't done it yet, consider subscribing. [more]
Monday, 28 July 2003, 1:42 PM CET

People want antispam registry, senator says
74% surveyed support national do-not-spam list. [more]
Friday, 25 July 2003, 2:22 PM CET

Credit card hackers swap tricks online
Chatrooms used for sharing hints and tips in growing business of ID theft. [more]
Friday, 25 July 2003, 2:13 PM CET

Scientists: High-tech votes can be hacked
Software flaws in a high-tech voting system could allow vandals to tamper with election results in several US states, computer security researchers said on Thursday. [more]
Friday, 25 July 2003, 12:30 PM CET

Charney tells Congress vulnerabilities are a fact of life
He acknowledged the arguments for and against single-vendor IT environments. [more]
Friday, 25 July 2003, 10:53 AM CET

Oracle, Microsoft warn of database flaws
Both Oracle Corp. and Microsoft Corp. have discovered new vulnerabilities in their databases, the two companies reported. [more]
Friday, 25 July 2003, 10:49 AM CET

Peering over the firewall
Using Snort and a homemade read-only cable to follow network traffic. [more]
Friday, 25 July 2003, 10:46 AM CET

CSOs creating cultural change
The convergence of physical and IT security is driving the appointment of chief security officers within the enterprise, a new title that is creating cultural change, the senior cybersecurity consultant at Pinkerton Australia Pty. Ltd., Atif Ahmad, said. [more]
Friday, 25 July 2003, 10:45 AM CET

Demonstrating ROI for penetration testing (part one)
This is the first in a series of articles demonstrating ROI (return on investment) for a penetration test. You will have to step into the world of budgeting, cost justification, resource allocation, and learn a few unfamiliar terms. [more]
Friday, 25 July 2003, 10:43 AM CET

Learning to live with security bugs
Near-simultaneous vulnerability announcements from Microsoft and Cisco force IT professionals to make peace with vulnerable technology. [more]
Thursday, 24 July 2003, 6:34 AM CET

Spam clients outed, credit card details published
Anti-spam activists have upped the ante in their fight against junk email by publishing the details - including credit card information - of people who've ordered spamming services online. [more]
Thursday, 24 July 2003, 6:28 AM CET

Apache 1.3.28 has been released
The Apache Group released version 1.3.28 of the Apache HTTP Server. This version of Apache is principally a security and bug fix release. [more]
Thursday, 24 July 2003, 2:06 AM CET

Security threats that can't be stopped
"Companies sometimes attempt to secure everything to the same level," Bernie Cowens of Rainbow Technologies said. "As a result, either routine access becomes too hard or insufficient protection is afforded to highly sensitive data." [more]
Thursday, 24 July 2003, 2:04 AM CET

Best network port scanners for Linux
The important thing to remember about network scanning is that new security flaws come out every day. As with antivirus software, scanners need to be updated with new signatures, or "checks," to recognize a flaw. [more]
Thursday, 24 July 2003, 1:43 AM CET

3 things you don't wanna know about your personal information
Maybe it's time to start reading those long, boring and deliberately confusing privacy policies after all. [more]
Thursday, 24 July 2003, 1:31 AM CET

Wells fargo customers hit with e-mail scam
Message included an attachment used to collect passwords from recipients' PCs. [more]
Thursday, 24 July 2003, 1:29 AM CET

Identity theft rockets 80 per cent
And the danger isn't only on the internet, warns analyst. [more]
Thursday, 24 July 2003, 1:26 AM CET

Australia to ban spam
Australia's government will ban unsolicited commercial email later this year. [more]
Thursday, 24 July 2003, 1:18 AM CET

Privacy: for every attack, a defense
Yes, it's a grueling battle. However, as threats pop up constantly on fronts old and new, concerned citizens and like-minded legislators quickly parry. [more]
Thursday, 24 July 2003, 1:15 AM CET

Web applications open to hack attacks
Resulting 'serious flaws' leave 97 per cent of sites open to abuse. [more]
Thursday, 24 July 2003, 1:13 AM CET

Black Hat Briefings 2003 keynote speakers announced
Read on to see who are the keynote speakers for this summer's Black Hat Briefings, the annual conference and workshop designed to help computer professionals better understand the security risks to their computer and information infrastructures by potential threats. [more]
Wednesday, 23 July 2003, 8:21 PM CET

An Overview of Issues in Testing Intrusion Detection Systems
While intrusion detection systems are becoming ubiquitous defenses in today's networks, currently we have no comprehensive and scientifically rigorous methodology to test the effectiveness of these systems. [more]
Wednesday, 23 July 2003, 8:01 PM CET

Cisco flaw: fears ease
Despite fears that a flaw in the software that controls most of the routers and switches in the Internet would lead to widespread attacks and outages, security monitoring companies say they have seen little indication of that happening. [more]
Wednesday, 23 July 2003, 12:06 PM CET

Keys to the kingdom
Networks carry the lifeblood of the enterprise—and in so doing, offer increasingly porous defences against attack. [more]
Wednesday, 23 July 2003, 11:51 AM CET

If you can't stand the heat, don't call 'em
If you're not prepared to deal with the consequences of bringing in the authorities, making that phone call can be a bad business move. [more]
Wednesday, 23 July 2003, 11:43 AM CET

Detecting SQL injection in Oracle
This paper takes the subject of SQL injection further and investigates the possibilities for the Oracle Database Administrator to detect SQL injection in the wild. [more]
Wednesday, 23 July 2003, 11:42 AM CET

Windows passwords broken in seconds
Swiss researchers can crack a Windows password in 13.6 seconds. [more]
Wednesday, 23 July 2003, 11:35 AM CET urged to crack down on ID theft
The Government has been urged to take steps to help combat the growing problem of identity fraud, which costs the UK economy a massive £1.3 billion a year. [more]
Wednesday, 23 July 2003, 11:35 AM CET

Why biometrics is no magic bullet
This promising ID technology works best in controlled situations - which are hardly the norm in the real world. [more]
Wednesday, 23 July 2003, 11:31 AM CET

Hacking into bank accounts is dead easy, say experts
Hacking into a bank account is frighteningly easy. All one needs is a rudimentary know-ledge of computers, spy software easily downloaded from the internet and a vulnerable PC. [more]
Wednesday, 23 July 2003, 11:27 AM CET

'Phishing' e-mail scams reel in IDs
The Web sites look real and the information sought seems justified. But it's really the latest form of e-mail scam, called "brand spoofing," "carding" or "Phishing." [more]
Wednesday, 23 July 2003, 11:17 AM CET

Security without the sweat
SSL VPNs ease the burden of securing large-scale Internet applications. [more]
Wednesday, 23 July 2003, 11:13 AM CET

Hackers wardrive into wireless
DEFCON 11 is taking place at the Alexis Park Hotel, Las Vegas on August 1-3, 2003. Admission is $75 in U.S. currency at the door -- cash only. [more]
Tuesday, 22 July 2003, 8:02 PM CET

Hackers lose a patron saint
If there is a heaven, the angels are in for a hell of a time when Jude Milhon, the Internet's real and very earthy patron saint of hacking, shows up. [more]
Tuesday, 22 July 2003, 8:01 PM CET

Pervasive.SQL gets security boost
Pervasive Software Inc. on Tuesday rolled out the beta of an update to its embeddable database engine that's bristling with security enhancements. [more]
Tuesday, 22 July 2003, 7:59 PM CET

Private-sector IT execs see diminished cybersecurity role
A major DHS cyber security post remains vacant. [more]
Tuesday, 22 July 2003, 2:54 AM CET

Feds nab teen who scammed AOL
The Federal Trade Commission settles charges against a 17-year-old boy who used spam to snooker AOL customers into giving him their credit-card numbers. After going on a shopping spree, he's agreed to repay the money and spam no more. [more]
Tuesday, 22 July 2003, 2:52 AM CET

The next big Linux controversy
It's the next big Linux controversy: Who should be liable if customers wind up using software that was created from misappropriated intellectual property? [more]
Tuesday, 22 July 2003, 2:48 AM CET

Con artists pretending to be Internet companies
Stealing identities and credit card numbers with bogus e-mail and Web sites that appear to come from legitimate companies is an increasing problem on the Internet. [more]
Tuesday, 22 July 2003, 2:43 AM CET

Wireless LAN security falls short of expectations
Security is still the number-one inhibitor to enterprise adoption of wireless lan technologies, says META group. [more]
Tuesday, 22 July 2003, 2:42 AM CET

Crime pays for identity thieves
The number of consumers who have fallen prey to identity thieves is severely underreported, market researcher Gartner said in a survey. [more]
Tuesday, 22 July 2003, 2:41 AM CET

Study: security issues block widespread mobile app deployment
Fear of a security breach is hindering more widespread deployment of wireless applications, according to the latest Roundtable discussion hosted by Sage Research Inc. [more]
Tuesday, 22 July 2003, 2:37 AM CET

Interview with Rafeeq Ur Rehman
The author of "Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID" discusses open source security, intrusion detection and the disclosure of vulnerabilities. [more]
Monday, 21 July 2003, 11:06 AM CET

HNS Newsletter Issue 171 has been released
You can read the Newsletter in TXT or PDF format. If you haven't done it yet, consider subscribing. [more]
Monday, 21 July 2003, 11:01 AM CET

Chat channels make online fraud easier
Groups use Net to sell credit-card data, swap hacking tips. [more]
Monday, 21 July 2003, 10:38 AM CET

Major banks to meet after internet banking fraud
Banking group Absa says it will have discussions with other major banks today about the challenges faced by internet banking fraud. [more]
Monday, 21 July 2003, 10:25 AM CET

Congress takes small steps on privacy legislation
Bill's passing in doubt due to opposition from within technology industry. [more]
Monday, 21 July 2003, 10:22 AM CET

Getting certified in information security
The CISSP is a good complement to your BCI/DRII certifications. [more]
Monday, 21 July 2003, 10:22 AM CET

Increasing Windows 2000 and XP security
This article will identify common security threats and services to disable. [more]
Monday, 21 July 2003, 10:16 AM CET

Guilty plea in Kinko's keystroke caper
If you used a computer at a Kinko's in New York City last year, or the year before, there's a good chance that JuJu Jiang was watching. [more]
Monday, 21 July 2003, 10:15 AM CET

Waiting for the worms
The hole's been announced, the patch has been released. Now there's nothing to do but wait for the worm to come and wreak its ugly havoc. [more]
Monday, 21 July 2003, 10:10 AM CET

Missing computer adds to airport screeners' woes
Federal officials are quietly scouring the Washington, D.C., area for a stolen laptop computer loaded with vital information on dozens of airport baggage and passenger screeners that could be used to forge IDs. [more]
Monday, 21 July 2003, 10:08 AM CET

Hackers attack Cisco flaw
Hackers made some attempts Friday to bring down network routing gear by exploiting a flaw in Cisco Systems Inc. equipment that carries the bulk of the world's Internet traffic. [more]
Monday, 21 July 2003, 10:07 AM CET

Forensic log parsing with Microsoft's LogParser
The purpose of this article is to demonstrate log file forensics for IIS using SQL queries with Microsoft's LogParser tool. [more]
Monday, 21 July 2003, 10:06 AM CET

Review - Mastering Red Hat Linux 9
Here it is again, another book dedicated to Red Hat Linux. As a fan of the operating system I jumped right on it to see what it can offer compared to the other books on the same subject. Is it worth having on your bookshelf? Read on to find out. [more]
Friday, 18 July 2003, 10:49 AM CET

Let's see some ID
The best candidate for the next temporary panic is RFID, the radio frequency ID tags that will one day replace barcodes. [more]
Friday, 18 July 2003, 9:45 AM CET

Unshackling the Xbox: hackers and the right to tinker
The Xbox is a particularly attractive target for hackers because while it is essentially a standard PC modified to do only a few things, like play Xbox games, it is much cheaper than a PC. [more]
Friday, 18 July 2003, 9:39 AM CET

Trojan turns victims into DDoS, spam zombies
Anti-virus vendors are warning of the mass mailing of a new Trojan program "Webber" (aka "Heloc" and "Berbew") which is capable of turning infected PCs into pr0n or spam propagating zombies. [more]
Friday, 18 July 2003, 9:36 AM CET

Hacker targets Sophos mouthpiece
A row has once again broken out between two of the virus world's best known characters -- Sophos senior technology consultant and mouthpiece Graham Cluley, and Gigabyte, a female Belgian hacker. [more]
Friday, 18 July 2003, 9:35 AM CET

The long and short of snort intrusion detection
Snort is not for the faint of heart. It requires a high level of technical aptitude, as well as knowledge about software security. And like most intrusion-detection products, it requires time to be tuned to a particular network environment. [more]
Friday, 18 July 2003, 9:33 AM CET

Don't let your babies grow up to be hackers
If there's one thing Sarah Gordon understands, it's the mind of the virus writer. In her current position as a senior research fellow for the Symantec Antivirus Research Center, Gordon conducts research on the ethical implications of technology and the psychological aspects of human-computer interaction. [more]
Friday, 18 July 2003, 9:17 AM CET

Poor funding is biggest obstacle to effective IT security
Inadequate funding remains the single largest obstacle to implementing effective IT security measures at most companies, according to a global survey by Ernst & Young International. [more]
Friday, 18 July 2003, 9:16 AM CET

WPA to whip wireless security into shape
Wired Equivalent Privacy, better known as WEP, has been one of the security industry's laughingstocks for years. However, a fix is in the works—again. Still, this time, the results look promising. [more]
Friday, 18 July 2003, 9:15 AM CET

Bill aims to curb Net censorship
Would-be Internet censors in places such as China and Myanmar could have a tougher time restricting the free flow of information, according to a measure that the U.S. House of Representatives approved. [more]
Friday, 18 July 2003, 9:12 AM CET

Upload a file, go to prison
Two congressmen introduce a bill to criminalize the uploading of copyright works to peer-to-peer networks. The penalty: five years in prison and $250,000 in fines. Critics say the law goes too far. [more]
Friday, 18 July 2003, 9:09 AM CET

Changing the game
The e-enabled workplace is constantly demanding more from its creators. Geoff Haggart, VP for EMEA at Websense explains how employee Internet management (EIM) has come of age. [more]
Friday, 18 July 2003, 4:16 AM CET

Microsoft admits flaw in Windows software
"This is one of the worst Windows vulnerabilities ever," said Marc Maiffret, an executive at eEye Digital Security. [more]
Thursday, 17 July 2003, 9:49 AM CET

Senate moves to kill Pentagon terrorism surveillance program
Without fanfare, senators debating defense spending for next year have proposed eliminating all money for the Pentagon's development of a vast computerized terrorism surveillance program that has raised privacy concerns. [more]
Thursday, 17 July 2003, 9:42 AM CET

How to combat cyberstalking
Stalking is defined as "willful, malicious and repeated following and harassing of another person." [more]
Thursday, 17 July 2003, 9:38 AM CET

A new tool for combating spam
Users on GNU/Linux boxes have long enjoyed the comfort of battling spam using tools like SpamAssasin. Those living life on Redmond way have not been fortunate. The company's flagship products OutlookExpress and Microsoft Outlook are ill-equipped to filter out spam. The 'Rule' logic is woefully inadequate. [more]
Thursday, 17 July 2003, 9:36 AM CET

Hackers exploit lax home worker security
350,000 remote workers' PCs are back doors into corporate networks, claims survey. [more]
Thursday, 17 July 2003, 9:33 AM CET

Burden of spoof
If you got an e-mail from someone you didn't know asking for credit card numbers and personal financial information, would you give it to them? Actually, you might, if you're not careful. [more]
Thursday, 17 July 2003, 9:29 AM CET

Totally random
How two math geeks with a lava lamp and a webcam are about to unleash chaos on the Internet. [more]
Thursday, 17 July 2003, 9:25 AM CET

Network security warnings ring out
The public sector's commitment to network security has evaporated since the President's Critical Infrastructure Protection Board was folded into the nation's Department of Homeland Security. [more]
Thursday, 17 July 2003, 9:24 AM CET

Blogs: another tool in the security pro's toolkit (part one)
You can feed your addiction to information, get better security results, and spend less time doing it. My name is Scott, and I'm an information addict. [more]
Thursday, 17 July 2003, 9:23 AM CET

ISPs rush to fix Cisco flaw
nternet service providers are vulnerable to a flaw in Cisco routers that could cause some Web sites and servers to become inaccessible, according to a major telecommunications company and network administrators familiar with the issue. [more]
Thursday, 17 July 2003, 9:20 AM CET

Review - MPLS and VPN Architectures, CCIP Edition
If you are a regular Help Net Security visitor, you are probably familiar with Cisco Press titles, that are intended for the readers interested in getting some kind of a Cisco Systems certification. Due to the solely technical content of this book, the review is slightly different, as it provides the readers with an overview on this publication. [more]
Thursday, 17 July 2003, 9:10 AM CET

Ten ways to defend against viruses
Here are some ways to help prevent malicious code from wreaking havoc at your company. [more]
Wednesday, 16 July 2003, 8:38 AM CET

Symantec 'security scan' distributes rootkit
Symantec Security Check has also been installing an on-line threat of its own in the form of a dangerous ActiveX control. [more]
Wednesday, 16 July 2003, 8:36 AM CET

'Overwhelming' increase in hack attacks
Report finds companies still failing to patch well-known vulnerabilities. [more]
Wednesday, 16 July 2003, 8:27 AM CET

Program focuses on security response
CERT introduced a program to certify information technology professionals in incident handling and response. [more]
Wednesday, 16 July 2003, 8:23 AM CET

Red alert on the e-war front
Is it possible to take down a superpower using only a keyboard, a mouse and an internet connection? [more]
Wednesday, 16 July 2003, 8:20 AM CET

Securing cyberspace: a shared duty
Old equipment, poor practices, slow response blamed for sloppy security. [more]
Wednesday, 16 July 2003, 8:10 AM CET

Microsoft toolkit helps build more secure web services
Microsoft announced the release of a technology preview of the next version of its free toolkit for developers building Web services, Microsoft Web Services Enhancements 2.0. [more]
Wednesday, 16 July 2003, 8:06 AM CET

Wireless has its pros, but is not without security implications
According to Chris Davis, executive at NamITrust, the enterprise security division within NamITech, WLANs have distinct security implications for organisations. [more]
Wednesday, 16 July 2003, 8:05 AM CET

Students settle debit-card cheating suit
Two computer hackers admitted in a settlement Monday that they never completed a device that could cheat university campus debit card systems out of food, laundry machine use or sports tickets. [more]
Wednesday, 16 July 2003, 7:57 AM CET

Interview: Moritz says CA will play with big boys in security
CA's chief security strategist discusses company's security challenges. [more]
Wednesday, 16 July 2003, 7:48 AM CET

Virus activity during the first half of 2003
The first half of 2003 was generally quiet in terms of virus activity. However, this does not mean there was total calm, as in these first six months there were two major epidemics. [more]
Wednesday, 16 July 2003, 1:49 AM CET

Linux firewall-related /proc entries
This article will discuss Linux kernel variables and the effect they have on network security for your host or firewall. These variables determine the handling of network packets and are independent of any kernel filtering rules. [more]
Tuesday, 15 July 2003, 7:41 AM CET

Hackers, software companies feud over disclosure of weaknesses
As Muhammad Faisal Rauf Danka recalls it, he tried 10 times to call a software maker about a devastating security flaw in one of its most popular programs. [more]
Tuesday, 15 July 2003, 7:26 AM CET

A quantum leap in cryptography
Visionaries are using photons to develop data-security systems that may prove the ultimate defense against eavesdropping hackers. [more]
Tuesday, 15 July 2003, 7:23 AM CET

Securing financial transfers
Integration software provider Sterling Commerce Inc. announced new software capabilities that enable community banks to meet federal rules of privacy and security when moving financial data between banks and other financial institutions. [more]
Tuesday, 15 July 2003, 7:06 AM CET

You've been hacked: What to do in the first hour
What you do in the first hour after a hack attack can make a big difference to the ongoing security of your network - here are the most important steps to take. [more]
Tuesday, 15 July 2003, 7:01 AM CET

Walk-by hacking
Most users don't realize that left untended, the wireless technology that can quickly connect computers will literally broadcast every bit of transmitted information to anyone with a computer and a $40 wireless networking card. [more]
Tuesday, 15 July 2003, 7:01 AM CET

Physical and IT security 'will converge'
Links between physical and virtual security must be thought through, according to Computer Associates' head of security software. [more]
Tuesday, 15 July 2003, 6:58 AM CET

Could hackers launch a denial-of-spam attack?
I received several tempting offers in my e-mail inbox this morning. "Get free information on how a $10,000 investment could return $25,000 in less than 30 days." Others promise untold pleasures or reveal how I can reduce my debt. [more]
Tuesday, 15 July 2003, 6:55 AM CET

The persistence of hoax is fading into the sunset, while the virus hoaxes it steadfastly debunked seem to live on forever. [more]
Tuesday, 15 July 2003, 6:50 AM CET

Pirate booty: 1 billion compact discs
More than one billion illegally copied compact discs were sold last year, the latest sign that the beleaguered music industry is failing in its bid to wipe out piracy. [more]
Tuesday, 15 July 2003, 6:48 AM CET

Secure shared hosting with IIS 5.0
This guide provides technical solutions, methodologies and a step-by-step explanation on how to build secure IIS 5.0 servers. [more]
Monday, 14 July 2003, 12:53 PM CET

HNS Newsletter Issue 170 has been released
You can read the Newsletter in TXT or PDF format. If you haven't done it yet, consider subscribing. [more]
Monday, 14 July 2003, 12:52 PM CET

Inkra virtualises the security switch
Organisations may have difficulty scaling infrastructure and operations sufficiently to address network security developments. Inkra is a company that provides some thought leadership in the area. [more]
Monday, 14 July 2003, 11:28 AM CET

States pass laws to protect identity
State lawmakers, alarmed by high-profile identity-theft scams, are adopting measures that could become models for a federal law protecting victims from the nation's fastest-growing crime. [more]
Monday, 14 July 2003, 9:23 AM CET

Hype, hacks, and bad press
The media, like all Internet users, will be bitten in the backside by the loss of freedom. It's a pity so few bother seeking facts to balance the “cyberterror” headlines. [more]
Monday, 14 July 2003, 9:14 AM CET

Security: yes, it's part of your job
If evil doesn't get you, ignorance will. Learn what everyone needs to know about SE Linux and TCPA. [more]
Monday, 14 July 2003, 9:12 AM CET

British man arrested for hacking into Fermilab computers
Computers at Fermi National Accelerator Laboratory are regularly scanned by hackers trying to get in. Most of the time, they can't. But once in a while, someone succeeds in tapping into computers at the facility near Batavia. [more]
Monday, 14 July 2003, 9:01 AM CET

Who's really responsible for hacker attacks
A new book postulates that it's human error--not hardware or software glitches--that leaves networks vulnerable to attack. Robert agrees--and explains how writing about hacks can make things more secure. [more]
Monday, 14 July 2003, 8:57 AM CET

Secrets to the best passwords
Variety makes them easy to remember, hard to guess. [more]
Monday, 14 July 2003, 12:55 AM CET

Cybersecurity laws expected
Congress considers imposing security standards on businesses. [more]
Monday, 14 July 2003, 12:41 AM CET

Honeynet: carders are getting slick
Researchers live among online credit card thieves for a month. [more]
Monday, 14 July 2003, 12:40 AM CET

Security staff - don't book that vacation yet
There are promoters of security event management tools, and then there are skeptics such as META Group Inc. analyst Chris King. [more]
Monday, 14 July 2003, 12:35 AM CET

Review - Build Your Own Server
I've had the pleasure of reading several books that build system administration skills essential for successfully managing a system. This time I went through a title that covers not only the configuration of an operating system on a server but also the actual building of a server. Do the step-by-step instructions deliver? Read on to find out. [more]
Friday, 11 July 2003, 3:57 PM CET

New wireless security solution from AirDefense
AirDefense introduced its AirDefense Guard 1120 as an entry-level solution to provide the highest level of security and support for enterprise wireless LANs at an affordable price. [more]
Friday, 11 July 2003, 3:57 PM CET

A holistic approach to security
Time to swap medieval security policies for a more collaborative attitude. [more]
Friday, 11 July 2003, 1:26 PM CET

RFID spy-chippers leak confidential data on the Web
Public relations flacks eager to win the public over to the benefits of mass RFID (Radio Frequency Identification) chip proliferation have ironically managed to leave their own confidential plans unprotected on the Web. [more]
Friday, 11 July 2003, 1:22 PM CET

IBM introduces EPAL for privacy management
IBM introduced a set of tools that will help companies automatically set and manage privacy policies that govern access to sensitive data stored in corporate applications and databases. [more]
Friday, 11 July 2003, 1:20 PM CET

How secure is your browser?
Results of a survey conducted by the Belgian IT security company, ScanIT, indicates that many of the worlds computers are "sitting targets" for attackers, despite the use of virus protection software and firewalls. [more]
Friday, 11 July 2003, 1:16 PM CET

Setting up a secure wireless network
If you have a low-end access point, your security will be limited to Wired Equivalent Privacy (WEP) and MAC address filters. With a higher end access point, you'll be able to turn on Temporal Key Integrity Protocol (TKIP). [more]
Friday, 11 July 2003, 1:16 PM CET

Aussie defacer arrested in Paris
A 17-year-old French cracker who defaced websites in Australia, Britain, and the United States with political messages has been arrested in Paris and ordered to stay away from the Internet while on parole, police revealed. [more]
Friday, 11 July 2003, 1:02 PM CET

Connect securely with ssh
You'll undoubtedly want to use ssh to work on your servers from remote sites, but it takes an assortment of tricks to keep progress rolling smoothly. [more]
Friday, 11 July 2003, 12:55 PM CET

Spam fight divides on party lines
Once thoroughly bipartisan, the debate in Washington over how to reduce the flow of bulk e-mail is now pitting Democrats against Republicans--a development that threatens to complicate enactment of laws regulating spam. [more]
Friday, 11 July 2003, 12:52 PM CET

Watch out for the scammers
SurfControl is warning people to use extra security precautions against "brand spoofing," which is a tactic used to defraud people. [more]
Friday, 11 July 2003, 12:42 PM CET

Adobe and IBM join to boost PDF security
IBM is expected to announce a partnership with software maker Adobe Systems on Thursday to boost security in documents created with Adobe's Acrobat software. [more]
Friday, 11 July 2003, 12:41 PM CET

Decoding mobile device security
In view of the proliferation of mobile devices, it's surprising how few are appropriately secured against the financial, legal and regulatory risks associated with the potential exposure of sensitive data. [more]
Thursday, 10 July 2003, 2:37 PM CET

NetScreen puts IPv6 in firewall beta
Makers of network security gear are lining up to help enterprises and service providers implement IPv6 (Internet Protocol version 6), the next-generation network layer protocol for the Internet that offers a vastly larger number of host addresses. [more]
Thursday, 10 July 2003, 2:31 PM CET

WLAN security: does anybody care?
About half of all enterprises neglect wireless local area network (WLAN) security, according to a new Jupiter Research report. [more]
Thursday, 10 July 2003, 2:27 PM CET

Mumu worm makes a mess
A worm leaves its mark - and exposes security deficiencies at remote offices. [more]
Thursday, 10 July 2003, 2:21 PM CET

IE bugs keep coming
Seventeen days from Bugtraq to patch. [more]
Thursday, 10 July 2003, 2:18 PM CET

Fake PayPal site could lead to identity theft
A realistic-looking site purporting to be from PayPal billing is asking for information, including password and PIN details, from users that could enable identity theft. [more]
Thursday, 10 July 2003, 2:14 PM CET

Feds: SSA vulnerable to identity theft
Congressional investigators working undercover obtained Social Security numbers for nonexistent newborns and used the Social Security numbers of dead people to obtain driver's licenses, exposing weaknesses at the Social Security Administration that could be exploited by identity thieves. [more]
Thursday, 10 July 2003, 2:13 PM CET

IBM unveils security language
IBM unveiled a programming language that enables enterprises a way to automate the enforcement of privacy policies across IT applications and systems. [more]
Thursday, 10 July 2003, 2:07 PM CET

FreeBSD 5.1 shows handy new features
FreeBSD includes a security utility that can minimize the damage caused by an attack on a service such as BIND or sendmail by running the service within an isolated environment, or jail. [more]
Thursday, 10 July 2003, 2:05 PM CET

Webcasters threaten to sue RIAA
A group representing small Webcasters is threatening to sue the Recording Industry Association of America on antitrust grounds, fearful that hundreds or thousands of stations will be pushed offline. [more]
Thursday, 10 July 2003, 1:58 PM CET

Review - WiFi Security
Books like the one I'm taking a look at today, clearly show that wireless security is not just about the infamous WEP. This is a hot topic, but is this book worth buying? [more]
Wednesday, 9 July 2003, 4:18 PM CET

MIT Kerberos 5 release 1.3 announced
The MIT Kerberos Team announced the availability of the new version of MIT Kerberos. Read on to discover where you can get it as well as the major changes since release 1.2.8. [more]
Wednesday, 9 July 2003, 3:15 PM CET

We've found the perfect solution to spam
The Internet Research Task Force's (IRTF) quest for an effective solution to spam has struck gold in the form of IT specialist Mark McCarron. [more]
Wednesday, 9 July 2003, 2:59 PM CET

Using ethical hacking to ensure security
Ethical hacking, also known as internal security auditing, is an effective method to determine security vulnerabilities within IT architectures. [more]
Wednesday, 9 July 2003, 2:51 PM CET

Careless PDA users threaten corporate security
More people are using PDAs for keeping business data, increasing the security problems faced by corporates, according to the second annual PDA Usage Survey. [more]
Wednesday, 9 July 2003, 2:50 PM CET

Who's watching you surf?
Citizen-rights groups turn to courts, Congress to keep tabs on legal surveillance. [more]
Wednesday, 9 July 2003, 2:49 PM CET

Honeypots - hitting the sweet spot
Cool new technologies are pushing honeypots closer to prime time. Honeypot guru Lance Spitzner gives us an advance look. [more]
Wednesday, 9 July 2003, 2:46 PM CET

Security unease as government buys software
Sitting at his laptop computer in a hotel near Toronto one day last October, Gregory Gabrenya was alarmed by what he discovered in the sales-support database of his new employer, Platform Software: the names of more than 30 employees of the United States National Security Agency. [more]
Wednesday, 9 July 2003, 2:44 PM CET

'Spoof' e-mail scam spreads
That e-mail may look like it's from a well-known company. But as more people have discovered in recent months, it could be an attempt to defraud you. [more]
Wednesday, 9 July 2003, 2:43 PM CET

Sci-fi security technologies a reality
Retinal scans, DNA identification access, fingerprint smart cards and voice driven activation. [more]
Wednesday, 9 July 2003, 2:38 PM CET

Experts say hacker hype is threat on its own
After a widely publicized hacking contest failed to cause as much damage as expected last weekend, computer security experts are advocating a novel response for Internet hackers out for a digital joy ride: ignore them. [more]
Wednesday, 9 July 2003, 2:38 PM CET

Pro-China site hit by hackers
Last weekend's hacking contest may have struck a high-profile Chinese site. [more]
Wednesday, 9 July 2003, 2:36 PM CET

21st Century Infamous Competitions
In yet another opinion article, Panda Sofware's Fernando de la Cuadra, shares his view on virus writers and their contests. [more]
Tuesday, 8 July 2003, 2:31 PM CET

Virus attacks up 17.5%
Last month's Bugbear-B worm was the most pernicious virus in the first half of 2003. Security firm Sophos received reports about 3,855 new viruses, a 17.5% increase compared to the same period last year, the firm said. [more]
Tuesday, 8 July 2003, 9:21 AM CET

Asset protection
Banks come in all shapes and sizes, from global financial services firms down to the smallest credit unions. But finding better ways to ensure security is a common concern. [more]
Tuesday, 8 July 2003, 9:18 AM CET

Oracle's security guard
Exec vying to put lock on hot market. [more]
Tuesday, 8 July 2003, 9:16 AM CET

Antivirus concerns in XP and .NET environments
This article will discuss new antivirus concerns within Microsoft's .NET framework and Windows XP applications. [more]
Tuesday, 8 July 2003, 9:07 AM CET

Basic hardening Linux
This article includes the essential steps an administrator must follow to harden a Unix system; specifically, a Red Hat Linux system. [more]
Tuesday, 8 July 2003, 9:04 AM CET

Requiem for a hacker
Security has become a very big business in IT over the past few years. You'd think its growth as a commercial market would have made all our information more secure. It hasn't. [more]
Tuesday, 8 July 2003, 8:59 AM CET

The fine art of password protection
During a recent European trade show, organizers convinced 90 percent of office workers traveling through a London tube station to reveal their computer passwords. They merely included the question at the end of a long list of seemingly harmless queries. [more]
Tuesday, 8 July 2003, 8:57 AM CET

Researchers keep an eye on the future of security
The idea of checking physical characteristics to authenticate a person's identity has a long and distinguished history. [more]
Tuesday, 8 July 2003, 8:51 AM CET

EDS set to protect mobile data
Hoping to cash in on a growing disaster-recovery market, Electronic Data Systems launched a service to protect data held on desktop computers, laptops and personal digital assistants. [more]
Tuesday, 8 July 2003, 8:48 AM CET

Start-up streamlines e-mail encryption
Voltage Security has its sights set on making sure that more people encrypt their e-mail. [more]
Tuesday, 8 July 2003, 8:47 AM CET

MIT project lets citizens 'Google' feds
Its creators hope it will become a Google of government, a massive Internet clearinghouse of information to help citizens track their leaders as effectively as their leaders track them. [more]
Monday, 7 July 2003, 4:01 PM CET

Review - The Complete C++ Training Course 4/e
This course could just be the right one to show that object orientation is the most efficient approach to solving software engineering problems. In this sense, it's an excellent choice for newcomers and for experienced C programmers, as both will find its C++ object oriented approach very convincing and understandable. [more]
Monday, 7 July 2003, 3:00 PM CET

HNS Newsletter Issue 169 has been released
You can read the Newsletter in TXT or PDF format. If you haven't done it yet, consider subscribing. [more]
Monday, 7 July 2003, 3:00 PM CET

Dutch mass spammer loses grip
Martijn Bevelander is not a happy man. The 23 year-old Dutch entrepreneur was exposed last week by the BBC as a mass spammer. Now his company Megaprovider is sinking. [more]
Monday, 7 July 2003, 2:35 PM CET

Kernel rootkits explained
In this article the basics of ‘rootkitting’ will be explained, and how you can protect yourself against them. [more]
Monday, 7 July 2003, 1:43 PM CET

Promises to protect customer data get some attention
Most online businesses promise they'll protect customer data as if it were their own. Now the government is holding them to it. [more]
Monday, 7 July 2003, 1:41 PM CET

Web hacking contest claims 'no big names'
Computer hackers vying in a global contest on Sunday defaced a slew of Web sites, but the damage was confined to the Internet's backwater of small, unsecured sites, security officials said. [more]
Monday, 7 July 2003, 1:35 PM CET

Swiss turn up the heat on cybercrime
Swiss efforts to combat cybercrime appear to be bearing fruit six months after the government set up a special unit to police the Internet. [more]
Monday, 7 July 2003, 1:34 PM CET

Review - Securing Business Information
This book is focused on the information technology in dynamic business environment. This book is a "step by step" guide about how to keep the enterprise data secure in a distributed environment. It describes a six-step process of securing business information that result in the Enterprise Security Plan. [more]
Friday, 4 July 2003, 3:06 PM CET

Sony alerts consumers of fraudulent spam e-mail
Sony reported that it has become aware of an unauthorized and deceptive spam e-mail that has been sent to consumers with the subject title "Sonystyle user and email address." [more]
Friday, 4 July 2003, 3:05 PM CET

A quick view on sendmail
Configuring sendmail can be a large and complex task, but it doesn't have to be. This article will give you some information to make decisions about when and how to change the default configuration. [more]
Friday, 4 July 2003, 2:13 PM CET

Closing the 'window of vulnerability'
Jack Clark, of the Avert Laboratory, Network Associates, suggests ways to protect systems from blended virus attacks. [more]
Friday, 4 July 2003, 2:08 PM CET

Hacking contest 'just hype'
Security experts say warnings of Web site defacement this weekend come from 'random loudmouths'. [more]
Friday, 4 July 2003, 2:06 PM CET

Wireless security not taken seriously
Wireless is attracting many users for its flexibility and power to deliver quality service at high speed. [more]
Friday, 4 July 2003, 2:06 PM CET

School district fails network security
Cub reporter shocked to find gaping security hole in Silicon Valley school district's network. [more]
Friday, 4 July 2003, 2:03 PM CET

Group releases Xbox exploit amid MS prosecution threats
A group of Xbox hackers called "Free-X" claim to have broken all security measures on the games console without any hardware modifications whatsoever, prompting Microsoft to threaten a legal attack against its members. [more]
Friday, 4 July 2003, 10:02 AM CET

Five tips for effective patch management
When Microsoft alone issues a new security patch about every fifth day, how can anyone keep up? [more]
Friday, 4 July 2003, 10:00 AM CET

Terrorism threat to drive security outsourcing
The threat of terrorist attacks is creating a huge demand for managed security services, and not just for large businesses, according to Forrester Research. [more]
Friday, 4 July 2003, 9:54 AM CET statement about the "defacement challenge"
It is quite clear, judging by the sharp decrease of the defacement notifications occoured during the last days, that the crackers aren't at the beach but they are rather rooting possible targets without defacing them. [more]
Friday, 4 July 2003, 9:49 AM CET

Malicious code propagation and antivirus software updates
It's important to remember that while antivirus software vendors continue to improve the speed and reliability of their signature update mechanisms, there will always be some window of time when a system does not contain signatures to detect a particular worm or virus. [more]
Friday, 4 July 2003, 9:46 AM CET

Microsoft patches Passport
Microsoft patched a hole in its .Net Passport identity management service after a security researcher disclosed a potentially serious flaw that could enable attackers to hijack Passport accounts. [more]
Thursday, 3 July 2003, 12:32 AM CET

Wireless hunters on the prowl
Despite rocketing popularity, awareness of Wi-Fi's weak security remains relatively low. WorldWide WarDrive takes to the streets to drive home the point that wireless networks need protection, too. [more]
Thursday, 3 July 2003, 12:27 AM CET

Security threats to fuel IT spending
IT spending went through the roof just before the millennium as companies upgraded their equipment to minimize possible disruption, and the threat of terrorist attack is now having a similar effect on spending in the IT security sector, according to research firm Forrester. [more]
Thursday, 3 July 2003, 12:25 AM CET

Spam peddlers hijack computers
Computers belonging to thousands of companies across the world are being hijacked by e-mail spammers to disguise their true identities and host their websites. [more]
Thursday, 3 July 2003, 12:24 AM CET

Web site warning: defacement contest sunday
Crackers and low-level online vandals are planning some post-Independence Day fireworks this weekend with a so-called Web site defacement challenge. The goal is for participants to deface as many sites as possible within the six-hour time limit. [more]
Thursday, 3 July 2003, 12:22 AM CET

Exploitation of data streams authorized by a network access control system for arbitrary data transfers
This paper presents various concepts to researchers and NACS administrators to explain that each time an administrator thinks he only allows the HTTP protocol to get in and out of his internal network, he also allows arbitrary data transfers through his secured perimeter. [more]
Thursday, 3 July 2003, 12:18 AM CET

Review - Microsoft Windows Server 2003 Unleashed
Introducing a new era of computer networking Rand Morimoto and other esteemed authors put their own experience and knowledge in one place. If you are familiar with NT or server technology, or you are not but willing to learn, this book can easily guide you through any problem you wish to solve in the newest server environment. [more]
Wednesday, 2 July 2003, 3:29 PM CET

Shore up security
How to identify and correct weaknesses in your firm's network security. [more]
Wednesday, 2 July 2003, 7:06 AM CET

Man pleads guilty in internet securities fraud case
man has pleaded guilty to sending out more than 9 million junk email messages as part of a business scheme that defrauded investors of more than $US100,000. [more]
Wednesday, 2 July 2003, 7:03 AM CET

Code inspection puts Apache on par with commercial Web servers
The prevalent open-source version of the Apache Web server stacks up well with commercial Web servers in terms of the number of code defects, according to a study by Reasoning Inc. [more]
Wednesday, 2 July 2003, 7:03 AM CET

Building a Linux dial-up server, part 1
In this two-part series we're going to look at both dial-up and dial-in servers. [more]
Wednesday, 2 July 2003, 6:59 AM CET

California enacts full disclosure security breach law
From July 1 all firms doing business in California will be obliged to advise their customers what data might be disclosed if their systems are ever successfully attacked. [more]
Wednesday, 2 July 2003, 6:51 AM CET

The "hacker" who threatened Bloomberg gets prison
A Kazakh citizen was sentenced on Tuesday to more than four years in prison for hacking into Bloomberg L.P.'s computer system in an attempt to extort $200,000 from the business news service and its founder, Michael Bloomberg, now New York City's mayor. [more]
Wednesday, 2 July 2003, 6:50 AM CET

US anti-spam laws 'will legalise spam'
Proposed US legislation designed to clamp down on the spam is only likely to make the problem far worse, according to a leading anti-spam activist. [more]
Wednesday, 2 July 2003, 6:49 AM CET

Siemens offers security service
Siemens announced the expansion of its network security services portfolio to complement its SieQuence solution. [more]
Wednesday, 2 July 2003, 6:48 AM CET

Virus alliance expands by three security firms
Computer Associates, Sybari Software, and Symantec have joined the Virus Information Alliance, a group formed to be a centralized resource for providing information about virus threats and vulnerabilities that target Microsoft's products. [more]
Wednesday, 2 July 2003, 1:22 AM CET

Application security firms win investments
Two application-security vendors raised millions in capital Tuesday, and security analysts say the investments show the application security market is here to stay. [more]
Wednesday, 2 July 2003, 1:18 AM CET

Nothing is secret with spyware lurking in PCs
Spyware bots are sneaking into corporate PCs at an alarming rate, stealing information from e-mails, IMs, open applications and even tracking Web surfing habits. [more]
Tuesday, 1 July 2003, 1:51 PM CET

Certifying your security expertise
Check your transcript — you might already be a security specialist, according to Microsoft. [more]
Tuesday, 1 July 2003, 1:48 PM CET

Australians warned about Mandela email scam
Australians have been warned to beware of an email scam by a man claiming to be a lawyer for Nelson Mandela's ex-wife. [more]
Tuesday, 1 July 2003, 1:46 PM CET

For critics, safe PC feels like a jail
Some fear new built-in protections could kill openness and innovation. [more]
Tuesday, 1 July 2003, 1:13 PM CET

Security gone crazy
I just love it when legislation takes on popular issues and threatens to bring evolution to a grinding halt. [more]
Tuesday, 1 July 2003, 12:58 PM CET

IDS correlation of VA data and IDS alerts
This article discusses the correlation of VA data and IDS alerts to help prioritize events and reduce the time it takes to sift through events. [more]
Tuesday, 1 July 2003, 12:57 PM CET

Virus writers boost output in 2003
Virus writing over the first six months of this year has increased sharply. [more]
Tuesday, 1 July 2003, 12:53 PM CET

Law aims to reduce identity theft
A California law that requires e-commerce companies to warn consumers when their personal information may have been stolen could provide a boost for security firms. [more]
Tuesday, 1 July 2003, 12:52 PM CET

How many firewalls do you need?
Let's say you're a really small operation. You've got one server and you want to connect it the Internet. Obviously you're going to need a firewall. Do you need a whole separate system for it? [more]
Tuesday, 1 July 2003, 12:50 PM CET

Bill would require hacking disclosures
Embarrassed businesses and government agencies would have to notify consumers under a proposed law if hackers break into computers and steal some types of personal information, including Social Security numbers, driver's license numbers and credit card information. [more]
Tuesday, 1 July 2003, 12:45 PM CET

Prophylactic Data Security?
Data security is not is a huge concern because, in a highly competitive world, it is the most precious asset within any company. [more]
Tuesday, 1 July 2003, 11:52 AM CET


Patching: The least understood line of defense

Posted on 29 August 2014.  |  How many end users, indeed how many IT pros, truly get patching? Sure, many of us see Windows install updates when we shut down our PC and think all is well. It’s not.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.


Tue, Sep 2nd