Off the Wire

Off The Wire Archive

News items for September 2005

The spam song
Spam that is embedded with a music file could herald a new wave of malicious attacks warn email monitoring firm, Email Systems. [more]
Friday, 30 September 2005, 8:06 PM CET

The case for elliptic curve cryptography
Over the past 30 years, public key cryptography has become a mainstay for secure communications over the Internet and throughout many other forms of communications. [more]
Friday, 30 September 2005, 8:05 PM CET

UK firms 'ignoring' network security
Inability to measure risk leaves companies exposed, warns security firm. [more]
Friday, 30 September 2005, 7:30 PM CET

Security flaws found in interior dept. aystems
Interior's Inspector General discovered serious security issues and met with resistance to changing policies and procedures. [more]
Friday, 30 September 2005, 7:25 PM CET

US rejects changes to net control
The US has rejected calls by European Union (EU) officials to give control of the net over to a more representative United Nations (UN) body. [more]
Friday, 30 September 2005, 6:59 PM CET

The full disclosure debate
Is disclosing security bugs in public before notifying a vendor a good or bad idea? [more]
Friday, 30 September 2005, 3:07 PM CET

Weekly report on viruses and intruders
Agent.APB is a backdoor Trojan which creates the drwatson32.exe, winhttp.bin and wmvcore32.dll files on the computers it infects. [more]
Friday, 30 September 2005, 3:05 PM CET

Security firms warn of smarter viruses
Botnets fuel alarming growth in spyware. [more]
Friday, 30 September 2005, 3:04 PM CET

Phishing filter to be available in Internet Explorer 7
One of the program managers in the Microsoft Internet Explorer Security Team posted some news on a feature called Phishing Filter that will be available in Internet Explorer 7. [more]
Friday, 30 September 2005, 2:53 PM CET

Sophos top ten viruses and hoaxes in September 2005
Sophos, a world leader in protecting businesses against viruses, spyware and spam, has revealed the top ten viruses and hoaxes causing problems for businesses around the world during the month of September 2005. [more]
Friday, 30 September 2005, 2:35 PM CET

Computer security, it’s not about the software
Effective information security stems from well-trained staff combined with effective policies, where hardware and software are secondary. [more]
Friday, 30 September 2005, 10:35 AM CET

Destructive power of mobile viruses could rise fast
The dream of a connected world where PCs and mobile phones can communicate with the digital home and other devices is supposed to make life easier. But it could instead make life far more dangerous if malware developers have their way. [more]
Friday, 30 September 2005, 10:33 AM CET

Security workbench development environment for Java
A collection of Eclipse plug-ins designed to aid in the security-related aspects of developing Eclipse plug-ins, Java applications, and OSGi applications. [more]
Friday, 30 September 2005, 10:32 AM CET

IM networks under daily attack
This quarter has brought new parent worms, and September has seen the highest number of IM attacks ever. [more]
Friday, 30 September 2005, 10:31 AM CET

Visa delays plan to cut ties with CardSystems
The move is designed to 'facilitate' a buyout of the company by CyberSource. [more]
Friday, 30 September 2005, 10:28 AM CET

False mass mailings simulating a Spanish lottery notice
PandaLabs has recorded a new case of a fraudulent email message being sent to thousands of addresses. [more]
Friday, 30 September 2005, 3:42 AM CET

Ten steps to secure networking
Secure networking ensures that the network is available to perform its appointed task by protecting it from attacks originating inside and outside the organization. [more]
Friday, 30 September 2005, 3:26 AM CET

Spam proof Outlook with SpamBully
SpamBully 3 for Outlook and Outlook Express is an easy to use spam filter that uses artificial intelligence to quickly learn what is and isn't spam based on each user's unique personal email habits. [more]
Friday, 30 September 2005, 3:21 AM CET

Microsoft gets hacker feedback on IE Version 7 Beta 2
It sought advice at the Hack in the Box Security Conference. [more]
Friday, 30 September 2005, 3:09 AM CET

Soldiers in Iraq notified of possible identity theft
hile fighting in Iraq, Army Sgt. Steven Behr suddenly found himself vulnerable at home. [more]
Friday, 30 September 2005, 2:57 AM CET

Pod slurping: threat or hype?
"We're a little bit worried about it because people can put sensitive content onto these devices and move it around," Gartner Group Research Vice President Rich Mogull said. [more]
Friday, 30 September 2005, 2:52 AM CET

New security features in Visual Studio 2005
Visual Studio 2005 makes it easier for developers to write secure applications. [more]
Friday, 30 September 2005, 2:43 AM CET

European security and networking markets thrive
Cisco still the top dog. [more]
Friday, 30 September 2005, 2:35 AM CET

Hacker hits University of Georgia employee records server
As many as 1,600 Social Security numbers may have been exposed. [more]
Friday, 30 September 2005, 2:29 AM CET

Upgrade Linksys wireless products with SecureEasySetup feature
Linksys announced it has begun shipping products with SecureEasySetup technology. The technology enables users to set up and add security to their wireless networks with a push of a button. [more]
Thursday, 29 September 2005, 4:40 PM CET

SSL VPNs and OpenVPN: a lot of lies and a shred of truth
When you are working with mature security technologies (like SSL/TLS), security is often a zero sum game. [more]
Thursday, 29 September 2005, 2:17 PM CET

Microsoft looks to secure digital IDs
According to Microsoft officials, InfoCard integration could show up in Internet Explorer 7.0 even though InfoCard is currently not on the feature list. [more]
Thursday, 29 September 2005, 10:33 AM CET

Resources for integrating Dell and Microsoft patch management
Dell's OpenManage 4 software works with Microsoft Systems Management Server 2003 to offer customers a centralized view of all Dell PowerEdge servers connected to their network. [more]
Thursday, 29 September 2005, 9:44 AM CET

Trusted search software labels fraud site as 'safe'
Digital certificate firm GeoTrust's launch of a search engine with built in trust features this week has been marred by the classification of a phishing site as genuine. [more]
Thursday, 29 September 2005, 9:42 AM CET

Want security? You'd better wait for the new era of computing
Complexity in software design needs to be eliminated otherwise computing's future era will be no more secure than applications in the current era. [more]
Thursday, 29 September 2005, 9:36 AM CET

Google Secure Access on Mac OS X
Google Secure Access allows users to connect to Google's VPN to make WiFi connections more secure. [more]
Thursday, 29 September 2005, 12:52 AM CET

Coming next year: the first 'trusted' Linux OS
The National Security Agency has been calling for someone to develop a secure, mainstream operating system that can address system access and other security concerns at the very heart of an IT infrastructure. [more]
Thursday, 29 September 2005, 12:46 AM CET

Sun Solaris patches for Xsun(1) and Xprt(1) vulnerability released
Sun has released a security patch to fix a vulnerability in Solaris, which could be exploited by a local attacker to gain elevated privileges. [more]
Thursday, 29 September 2005, 12:43 AM CET

To secure a Mac workstation, remember the users
Securing the data on a workstation means securing user files and folders as well as application folders and operating system components. [more]
Thursday, 29 September 2005, 12:42 AM CET

Phishers' latest hook: SSL certificates
Most users recognize -- and sometimes disregard -- the warning box that pops up when inputting personal information like bank account codes on a trusted Web site accessed with an ironclad connection. [more]
Thursday, 29 September 2005, 12:36 AM CET

And they wonder why we hate DRM
If you believe that Digital Rights Management (DRM) technologies are aimed at protecting the artists against having their music shared on the Internet, you haven't been paying attention for the last several years. [more]
Thursday, 29 September 2005, 12:32 AM CET

Novell server hacked, used to scan for vulnerable computers
It was apparently set up by employees for gaming purposes. [more]
Thursday, 29 September 2005, 12:24 AM CET

Justification and ROI for automated penetration testing
This paper will help you justify the need for an automated penetration testing product and demonstrate the positive Return on Investment (ROI) that can be achieved. [more]
Thursday, 29 September 2005, 12:21 AM CET

The right way to secure your mobile apps
With the advent of affordable and reliable networking technologies, there has been a seismic shift in the way that firms deploy their digital assets over the last few years. [more]
Thursday, 29 September 2005, 12:16 AM CET

Security breaches could prove costly to data companies
Some people cut their ties with data management companies; others hire lawyers. [more]
Thursday, 29 September 2005, 12:13 AM CET

Rule Set Based Access Control 1.2.5 available
RSBAC is a flexible, powerful and fast open source access control framework for current Linux kernels. [more]
Wednesday, 28 September 2005, 2:57 PM CET

Wireless security for hotspot users: iPig to the rescue
Germany based, Windows security and web applications experts at iOpus, just released iPig, a freeware wireless security application. [more]
Wednesday, 28 September 2005, 2:27 PM CET

AOL unscathed after phishing attack
AOL is confident that the recent phishing attack on its customers failed to cause any harm. [more]
Wednesday, 28 September 2005, 1:52 PM CET

Government employees to road test smartcards
Computerworld understands the proposal has the backing of the Department of Human Services and Centrelink and will enable public servants to work on collaborative, cross-portfolio projects without having their employee identities constantly reinvented. [more]
Wednesday, 28 September 2005, 1:50 PM CET

Microsoft releases Office SP2
Microsoft has released Service Pack 2 for Office 2003 which addresses reliability issues highlighted by customers. [more]
Wednesday, 28 September 2005, 1:48 PM CET

Using a Blog service to minimize your exposure to spammers
Coveno is your typically looking blog, but it has a twist - it is, as the authors call it, web's first public email account. [more]
Wednesday, 28 September 2005, 1:46 PM CET

Red Hat submits Linux for security evaluation
Red Hat Enterprise Linux is being evaluated for Common Criteria certification on a broad range of IBM eServer systems, Red Hat announced today. [more]
Wednesday, 28 September 2005, 1:42 PM CET

Windows rootkits come of age
SecurityFocus interviews Greg Hoglund and Jamie Butler on the state of Windows rootkits and how quickly they have evolved. Watch for some detailed Infocus technical articles on the subject of rootkits coming in October. [more]
Wednesday, 28 September 2005, 1:39 PM CET

GAO says IT systems for air traffic vulnerable
GAO report says key parts of U.S. air traffic control system are vulnerable to hackers. [more]
Wednesday, 28 September 2005, 1:38 PM CET

SAP TV: videos on Sarbanes-Oxley and biometrics
These are two video files created by SAP. They deal with Sarbanes-Oxley and using biometrics with SAP products. [more]
Wednesday, 28 September 2005, 1:37 PM CET

Digital plague hits online game World of Warcraft
A digital virus spread by terrorists left bodies on the streets and cities quarantined by the government. [more]
Wednesday, 28 September 2005, 1:35 PM CET

Linux RealPlayer could face zero-day attack
The Linux versions of the RealPlayer and Helix Player have a zero-day vulnerability that could allow attackers to execute commands remotely. [more]
Wednesday, 28 September 2005, 1:34 PM CET

Mobile users are lax on security
A survey of attendees at the CTIA (Cellular Telecommunications Industry Association) Wireless IT and Entertainment conference in San Francisco suggests that even savvy mobile telecommunications users have been slow to use security technologies on their mobile devices. [more]
Wednesday, 28 September 2005, 1:33 PM CET

Password overload plagues
Managing multiple passwords is driving end-users up the wall and leading to rising help desk costs due to frequent password reset calls. [more]
Wednesday, 28 September 2005, 1:29 PM CET

Cisco teams with Trend Micro on security service
Cisco Tuesday is expected to announce a number of new security features for its networking products, including a security service it has developed with Trend Micro that is designed to cut down on the spread of worms and viruses. [more]
Wednesday, 28 September 2005, 1:27 PM CET

Securing sensitive data in outsourced environments
Download this case study and learn how a point of use security strategy enables companies to expand information sharing without giving up their oversight and control. [more]
Wednesday, 28 September 2005, 1:22 PM CET

Lawmaker doesn't rule out cybersecurity regulation
Dan Lungren says Congress should consider regulations and incentives to get companies to consider cybersecurity. [more]
Wednesday, 28 September 2005, 1:20 PM CET

A continuing look at Windows v. Linux security
You will never be 100% "secure" because the upper limit is bound by human stupidity. [more]
Tuesday, 27 September 2005, 5:26 PM CET

Secure cellphone spec advances
An ad hoc industry group has taken its first step toward delivering in the first half of 2006 a hardware-security standard for cellphones. [more]
Tuesday, 27 September 2005, 5:23 PM CET

Monitoring, archiving and indexing enterprise e-mail
Most consumer e-mail clients have a recycle bin or trash feature that is a temporary location for recently deleted e-mail. But this does not provide the long term recovery that businesses may need," said Edward Berry, senior I.T. consultant and Program Manager for Computing Solutions. [more]
Tuesday, 27 September 2005, 9:46 AM CET

Windows security update for DirectX 8
Microsoft has reported two buffer overflow problems in DirectX and announced that the update that resolves them is available. [more]
Tuesday, 27 September 2005, 1:07 AM CET

Spyware is being designed for a broader audience
There are over 530 commercial spy programs, with about 5 brand new ones appearing each month. Commercial monitoring spyware includes keyloggers, email redirectors, screen recorders and more. It should not to be confused with adware. [more]
Tuesday, 27 September 2005, 1:06 AM CET

Credit companies promise tighter security
The big three U.S. credit reporting firms promised last week that they would come up with an encryption standard. [more]
Tuesday, 27 September 2005, 1:05 AM CET

ID theft protection solution: virtual authentication devices
Bharosa Virtual Authentication Devices provide the enterprise with optimal defenses against identity theft crimes including phishing, trojans and malware. [more]
Tuesday, 27 September 2005, 1:03 AM CET

Techniques for safely hosting untrusted add-ins with the .NET Framework 2.0
In this article, I'll explore a hypothetical application that supports add-ins, and examine how the application might be augmented to provide additional features and functionality to the user while also helping to protect the user's computer from malicious or unstable code. [more]
Tuesday, 27 September 2005, 1:02 AM CET

Painless patching
An emerging category of network equipment is giving network executives more time to install security patches by keeping servers safe until full-blown fixes can be tested and installed. [more]
Tuesday, 27 September 2005, 1:01 AM CET

Network automation: a fundamental shift in network management
This paper discusses how Network Automation can address rising network management costs and improve service quality. [more]
Tuesday, 27 September 2005, 12:55 AM CET

Symantec updates consumer security lineup
Symantec adds 'protection center' to Norton Internet Security 2006 applications suite. [more]
Tuesday, 27 September 2005, 12:53 AM CET

P.I. Protector Mobility Suite available on U3 smart drive computing platform
P.I. Protector includes portable e-mail technology, which provides users with portable Outlook and Outlook Express e-mail access as well as private Internet Explorer Web browsing with portable browser settings, and profile-based file synchronization. [more]
Tuesday, 27 September 2005, 12:52 AM CET

The security challenge
With more than one in three users on laptops, securing mobile devices --- and the data on them -- is becoming more critical than ever. [more]
Tuesday, 27 September 2005, 12:50 AM CET

Searching for online security
GeoTrust launches a search engine to help consumer identify credit card scams on the web. [more]
Tuesday, 27 September 2005, 12:49 AM CET

Agencies need a mix of tools for incident response
Federal information technology managers need a mix of tools to quickly respond to security incidents. [more]
Monday, 26 September 2005, 3:59 PM CET

Malware matures into control-hungry menace
Malicious code took decades to evolve but now threatens whole enterprises. [more]
Monday, 26 September 2005, 3:59 PM CET

CLI magic: p0f
P0f is a passive OS fingerprint tool written by Michal Zalewski. [more]
Monday, 26 September 2005, 1:19 PM CET

Tiscali in UK consumer data security breach
Tiscali has apologised after a data security breach. [more]
Monday, 26 September 2005, 1:14 PM CET

Charges underline importance of wireless data security measures
The critical importance of security in wireless networks has been underlined by a recent legal action launched against a store chain in the US. [more]
Monday, 26 September 2005, 1:13 PM CET

Phishers target Yahoo! Photos
Internet crooks looking to capture login details of Yahoo! accounts are changing tactics. [more]
Monday, 26 September 2005, 1:12 PM CET

Finger on the pulse of identity
The contours of the finger, the patterns of the iris and the shape of the hand can all be used to provide strong authentication, but are these - and other – biometric technologies sufficient to provide good security while also ensuring the privacy and trust of end users? [more]
Monday, 26 September 2005, 8:44 AM CET

How to set up Backup 3 and save your data
In this article I'm going to show you how to set up Backup 3. [more]
Monday, 26 September 2005, 2:45 AM CET

Axis Communications' Axis 210 network camera
Axis touts the camera as an effective, motion-sensitive surveillance tool, offering a bidirectional audio option on top of video. But how effective is it, really? [more]
Monday, 26 September 2005, 2:15 AM CET

Identity 2.0 validates users at packet level
Identity management is becoming an increasingly important security technology for companies faced with legislative and financial concerns. [more]
Monday, 26 September 2005, 1:50 AM CET

Auditor: the security tool collection
Auditor gives you easy access to a broad range of tools in almost no time. [more]
Monday, 26 September 2005, 1:44 AM CET

Apple plugs ten 'critical' security holes
More fixes for OS X. [more]
Monday, 26 September 2005, 1:26 AM CET

The digital dark age
The quicker we are to record and store our lives in digital form, the bleaker the future of information looks, writes John Huxley. [more]
Monday, 26 September 2005, 1:24 AM CET

Network access management
This Webinar will explore questions like, what's the status of large corporation initiatives like Cisco's NAC and Microsoft's NAP? [more]
Monday, 26 September 2005, 12:49 AM CET

Symantec to unveil new data protection software
Symantec on Tuesday plans to unveil new software that allows data to be backed up instantly and recovered from any point in time. [more]
Monday, 26 September 2005, 12:34 AM CET

Phishing attacks, and cures, grow more sophisticated
Phishing is hooking more victims as the e-mail fraud attacks become more sophisticated and prevalent. [more]
Monday, 26 September 2005, 12:30 AM CET

Underground without firewalls
Deep underground somewhere in south-east England, security experts have built a data hosting center almost entirely based on open source operating systems. [more]
Monday, 26 September 2005, 12:15 AM CET

Troubled CardSystems to be sold
CyberSource announces it has signed a letter of intent to buy company. [more]
Monday, 26 September 2005, 12:09 AM CET

Financial firms declare war on hacking
The focus is on eliminating vulnerabilities by building security into applications rather than relying on perimeter security tools. [more]
Friday, 23 September 2005, 9:33 AM CET

Digital signatures are key to e-mail security
Digital signatures based on third-party certificates secure your e-mail by verifying a sender's identity and the contents' authenticity. Here's how to set up the system. [more]
Friday, 23 September 2005, 9:30 AM CET

New phishing scam deceives with phony certificates
The new form of phishing makes use of a digital certificate to fool consumers. [more]
Friday, 23 September 2005, 9:26 AM CET

Confidential Notes 1.1 review
Confidential Notes allows Windows Mobile users to enter text, audio and drawings and have those entries password protected. [more]
Friday, 23 September 2005, 1:19 AM CET

Slaying spyware: advice from the experts
This panel of security industry experts explores the spyware problem, offering insight into the harm spyware is perpetrating and the best ways to combat it. [more]
Friday, 23 September 2005, 12:45 AM CET

Oracle CEO speaks on security
For a guy who has spent considerably more than $10 billion in the last year or so, Oracle CEO Larry Ellison remains a cool cookie. [more]
Friday, 23 September 2005, 12:43 AM CET

Earthlink escapes blame over phishing cock-up
Earthlink, the leading US ISP, has escaped blame for distributing software that incorrectly identified the website of a legitimate bank as potentially fraudulent. [more]
Friday, 23 September 2005, 12:41 AM CET

Mobile trojan targets PCs too
Virus writers have come up with a way to make their malicious software jump from a mobile phone to the PC. [more]
Friday, 23 September 2005, 12:36 AM CET

Thunderbird suffers similar security problem as Firefox
A bug - like the one disclosed Tuesday in the Linux edition of Firefox - relates to how the software processes URLs. It was rated as "extremely critical" by a security vendor. [more]
Friday, 23 September 2005, 12:35 AM CET

Staying anonymous in the internet jungle
Is it possible? [more]
Thursday, 22 September 2005, 12:45 PM CET

Protecting Linux against automated attackers
As many systems administrators will tell you, attacks from automated login scripts specifically targeting common account names with weak passwords have become a substantial threat to system security. [more]
Thursday, 22 September 2005, 12:30 PM CET

Mozilla suffers growing pains
A vulnerable age. [more]
Thursday, 22 September 2005, 12:10 PM CET

Data encryption about to make quantum leap
Researchers working at subatomic level promise security that's unbreachable. [more]
Thursday, 22 September 2005, 11:55 AM CET

Business skills key for security chiefs
Computing rounds up the news and views from Gartner’s IT Security Summit. [more]
Thursday, 22 September 2005, 11:41 AM CET

Phishers pluck Virgin customers
Email fraud hits Virgin Money credit card customers. [more]
Thursday, 22 September 2005, 11:40 AM CET

Philip Green firm hijacked for ID theft
Fraudsters have hijacked the identity of a firm owned by billionaire businessman Philip Green. [more]
Thursday, 22 September 2005, 11:35 AM CET

New Firefox 1.0.7 release fixes critical security bugs
All Firefox users are encouraged to download the new release. [more]
Thursday, 22 September 2005, 2:55 AM CET

Malicious hacker spams huge quantities of trojans, again
For the second day in a row, an unknown attacker Tuesday spammed major quantities of a new Bagle-esque Trojan horse that turns off virtually every known security program and blocks access to security sites on the Internet. [more]
Thursday, 22 September 2005, 2:21 AM CET

Cell phone spam now a crime
Arizona ruling could end those annoying text ads on your cell phone. [more]
Thursday, 22 September 2005, 1:56 AM CET

New wave of Bagle worms pounds Internet
A new wave of Bagle variants is pounding the Internet and appears to be trying to build a zombie army, according to security analysts. [more]
Thursday, 22 September 2005, 12:41 AM CET

Enterprise security solutions take Demo stage
Last day of show focuses on application continuity and e-mail security. [more]
Thursday, 22 September 2005, 12:38 AM CET

Is VOIP the next target of worms, spam?
Security vendor warns that hackers and virus-writers are eyeing Web telephony. [more]
Wednesday, 21 September 2005, 8:16 PM CET

Nortel boss warns of IP network chaos
Nortel chief executive Bill Owens has warned that the widespread move to digital networks could lead to severe economic disruption due to hacking attacks. [more]
Wednesday, 21 September 2005, 8:14 PM CET

IT security: take a walk on the dark side
There is no silver bullet that will protect an organization from all the threats. But there are some concrete steps an IT manager or a security officer can take, today, to skirt the dark side of the Internet. Stay vigilant. Educate yourself. [more]
Wednesday, 21 September 2005, 8:13 PM CET

Firms urged to take mobile email lead
Mobile email can lead to data loss and identity fraud if not secured properly. [more]
Wednesday, 21 September 2005, 8:07 PM CET

A whole new (biometrics) world
Security initiatives by the International Civil Aviation Organization (ICAO) could open up new avenues for the deployment of biometric technologies across the globe. [more]
Wednesday, 21 September 2005, 1:24 AM CET

Microsoft says security efforts showing fruit
"Attackers are getting more efficient," said Mike Nash, vice president for Microsoft's security business unit. [more]
Wednesday, 21 September 2005, 1:17 AM CET

IBM launches wireless shipping security
At the core of the technology is an IBM-developed tamper-resistant embedded controller that runs the Linux operating system and acts as an intelligent, real-time tracking device. [more]
Wednesday, 21 September 2005, 1:16 AM CET

Katrina scams proliferate
Hurricane Katrina is still wreaking havoc online weeks after its initial punch. [more]
Wednesday, 21 September 2005, 1:11 AM CET

Passwords in security
Breaking into corporate networks, and thereby corporate information, has never been easier. Why? Firstly, access to systems (usually Windows) at the desktop is universal. Secondly, most people, including techies, don't appear to know how to select adequately secure passwords. [more]
Wednesday, 21 September 2005, 12:21 AM CET

New worm uses the force
Security firm PandaLabs says a worm that spoofs Google is wending its way through the Internet via P2P networks. [more]
Tuesday, 20 September 2005, 7:26 PM CET

Spam map Googles junk mail proxies
Mailinator - the service that offers free, disposable email addresses for use in web registrations - has created a "real-time" spam map. [more]
Tuesday, 20 September 2005, 7:25 PM CET

Black box monitors cyberstalkers
Florida State University researchers have developed a system for gathering evidence against online predators and cyberstalkers. [more]
Tuesday, 20 September 2005, 7:24 PM CET

Security threat shifts to the desktop
Huge increase in malicious code targeting credit card and banking details. [more]
Tuesday, 20 September 2005, 4:51 PM CET

Phishers switch to European banks
Smaller targets, easier security. [more]
Tuesday, 20 September 2005, 11:19 AM CET

Microsoft introduces new security tool
Microsoft on Monday introduced the final version of a new security tool for locking down computers that operate in shared environments. [more]
Tuesday, 20 September 2005, 9:47 AM CET

Government IT slip reveals terror concerns
Hidden comments provoke debate. [more]
Tuesday, 20 September 2005, 9:46 AM CET

ISS discusses its security procedures
Internet Security Systems Chairman, CEO and President Tom Noonan says customers increasingly are looking for security platforms that do two basic things: Let the good guys in and keep the bad guys out. [more]
Tuesday, 20 September 2005, 9:41 AM CET

Secure wireless email on Mac OS X
If you’re concerned about strangers having open access to your usernames and passwords, and all the email you send and receive while connected to a public wireless network — whether you use a Mac or not — you’ll want to read this. [more]
Monday, 19 September 2005, 7:13 PM CET

Hackers thwart security by going small
Computer attackers are trying to circumvent improved defences in corporate networks by creating smaller worms and viruses that infect individual computers, says a report on Internet security to be released today. [more]
Monday, 19 September 2005, 5:00 PM CET

Big Brother is hearing you
'Acoustic spying' can crack passwords simply by listening to keystrokes. [more]
Monday, 19 September 2005, 4:58 PM CET

Secure identity and access management
Corporations today face increasing pressure safeguard corporate assets as well as comply with regulatory requirements. [more]
Monday, 19 September 2005, 4:55 PM CET

Apple Expo: Mac security system ships
A new powerful authentication system for Macs debuts at Apple Expo Paris this week. [more]
Monday, 19 September 2005, 4:50 PM CET

Government IT slip reveals terror concerns
A mistake in the consultation document on proposed new terrorism laws has let slip crucial details of government concerns. [more]
Monday, 19 September 2005, 4:49 PM CET

Ciphering out security
Recent headlines underscore the need for data encryption, and the idea is slowly gathering steam in businesses. Here's a look at various approaches taken by early adopters. [more]
Monday, 19 September 2005, 4:48 PM CET

Firefox and Mac security sanctuaries 'under attack'
Symantec has attacked the perceived security advantages of Firefox and Apple Macs by drawing unfavourable comparisons with Microsoft's software and describing Mac fans as living in a "false paradise". [more]
Monday, 19 September 2005, 4:48 PM CET

Security becomes financial watchword
The financial-services industry has been roiled this year by a string of data-security lapses involving tapes lost in transit, losses and theft of payment-card information, phishing attacks, and insider scams. [more]
Monday, 19 September 2005, 1:55 PM CET

UK tops zombie PC chart (again)
Britain is once again 'top of the bots' with the world's highest proportion of known bot-infected computers. [more]
Monday, 19 September 2005, 1:50 PM CET

Hackers target net call systems
Malicious hackers are turning their attention to the technology behind net phone calls, says a report. [more]
Monday, 19 September 2005, 12:29 PM CET

Businesses grapple with wireless security
Plethora of PDAs, browser-enabled phones, and other mobile devices threaten corporate data. [more]
Monday, 19 September 2005, 12:01 PM CET

Worm creates fake Google site
Spoofed webpage is identical, but displays alternative ads. [more]
Monday, 19 September 2005, 12:00 PM CET

An ugly look inside your firewall
Author Dan Verton, a former Computerworld reporter, has collected buckets full of tales - many of them far more serious, some downright criminal - in his new book entitled The Insider: A True Story. [more]
Monday, 19 September 2005, 11:53 AM CET

Cisco revamps security training
Cisco has revamped its security certifications and added new content to support its self-defending network strategy and "keep up with changing needs in the marketplace". [more]
Monday, 19 September 2005, 9:28 AM CET

Will corporates outsource security?
For IT security over the next few years, firms will increasingly turn to third-party services, and will also want better protection for mobile devices, according to predictions by internet security firm F-Secure. [more]
Friday, 16 September 2005, 7:10 PM CET

Arrest made in Berkeley laptop theft case
Police have arrested a man after recovering a stolen laptop that held personal data on more than 98,000 University of California, Berkeley students and applicants. [more]
Friday, 16 September 2005, 7:08 PM CET

The gloves are off taking the fight to the spammers
2005 has already seen spammers and virus writers become more shrewd, more malicious, more sophisticated and more hungry for commercial gain. [more]
Friday, 16 September 2005, 9:42 AM CET

Microsoft previews security features of Windows Vista
The company plans to beef up protection for Internet Explorer, firewalling, and anti-spyware, as well as hardening the operating system so that some tasks require administrator-level privileges to execute. [more]
Friday, 16 September 2005, 9:25 AM CET

New ID theft scam raises red flags
If you get a call from someone claiming to be a local court worker claiming you failed to report for jury duty, and you haven't been asked to serve, red flags should go up in your head immediately, state officials warn. [more]
Friday, 16 September 2005, 9:20 AM CET

Techies don't get security either
Heads of information security functions are more likely to be business managers than techies in future as companies take a more strategic approach that balances IT security threats against business drivers. [more]
Friday, 16 September 2005, 9:17 AM CET

Spyware prevention: effective network protection
Spyware is a much more complex form of malware than viruses or worms. It is stealthy and exploitative by nature, actively looking to deceive its host or target into acceptance. Learn about the only viable solution to such a threat. [more]
Friday, 16 September 2005, 9:16 AM CET

Demon founder pleads guilty to email hacking
Suspended sentence. Appeal planned. [more]
Friday, 16 September 2005, 9:13 AM CET

Are IT departments security risks?
Workers are more likely to indulge in dangerous behavior on the Internet when they know they have an IT department to get them out of trouble, according to a study. [more]
Friday, 16 September 2005, 9:08 AM CET

Financial firm finds safety in encryption
When it comes to data security, CNL Financial Group, one of the country's largest private real estate investment and development companies, wants to be a leader in its industry. [more]
Friday, 16 September 2005, 9:08 AM CET

Getting a handle on spam
Have any of your teachers recently complained that they're not receiving enough e-mail? Probably not. [more]
Thursday, 15 September 2005, 4:29 PM CET

Microsoft blames time constraints for pulled patch
Fixes needed more testing, claims Redmond. [more]
Thursday, 15 September 2005, 3:51 PM CET

Secure end points key for mobile computing
IT managers can reduce risk of using wireless networks, analysts say. [more]
Thursday, 15 September 2005, 3:44 PM CET

Identity theft on the rise
Companies House improving security, but leading credit agency still finds more than 100 cases of theft of auditors’ identities. [more]
Thursday, 15 September 2005, 3:42 PM CET

Dial VoIP for vulnerability
Voice over IP offers great savings in long-distance calls. But without extensive safeguards, VoIP can expose your phone system to the havoc affecting the rest of the Web. [more]
Thursday, 15 September 2005, 3:41 PM CET

One-in-six spyware apps tries to steal identities
And 60% of spyware is adware, according to a study from security firm Aladdin Knowledge Systems. [more]
Thursday, 15 September 2005, 1:09 AM CET

Integrating privacy, audit and compliance initiatives
Not so long ago, security issues were viewed as a necessary evil - in many ways the life insurance policy of the IT world. [more]
Thursday, 15 September 2005, 1:09 AM CET

Cisco extends network gear for RFID
Fulfilling promises made earlier this year, Cisco Systems Inc. has unveiled a number of new radio frequency identification (RFID) products and partnerships, setting the stage to enter yet another emerging market. [more]
Thursday, 15 September 2005, 1:07 AM CET

More tech fails to exorcise security risks
Current IT systems are inherently insecure and growing complexity will simply increase these risks, a leading academic has warned. [more]
Thursday, 15 September 2005, 1:05 AM CET

Teen pleads guilty in ISP, telecom hacking case
A published report says the teen hacked into Paris Hilton's cell phone. [more]
Thursday, 15 September 2005, 1:00 AM CET

Users tackle question of Linux vs. Windows on the server
The battle between Linux and Windows for server-side dominance is continuing to play out in data centers worldwide. [more]
Wednesday, 14 September 2005, 3:29 AM CET

Why not use hashes for the IE7 anti-phishing filter?
Several people have asked why Internet Explorer 7 will send "real" URLs instead of hashes to the AP (Anti-Phishing) server. [more]
Wednesday, 14 September 2005, 3:14 AM CET

Privacy enhanced computer display
The privacy-enhanced computer display uses a ferroelectric shutter glasses and a special device driver to produce a computer display which can be read only by the desired recipient, and not by an onlooker. [more]
Wednesday, 14 September 2005, 3:12 AM CET

Blocking malware without signatures
Contending with malware - a term that encompasses everything from viruses and worms to spyware and blended-threat attacks - is the most taxing burden on IT staff today. [more]
Wednesday, 14 September 2005, 3:10 AM CET

Microsoft's delay to patch fuels concerns
Microsoft's decision to cancel a security fix after finding problems with the patch has security experts questioning whether waiting for the fix to come next month might leave them open to attack. [more]
Wednesday, 14 September 2005, 3:05 AM CET

Acoustic snooping on typed information
There's an interesting new paper showing that if you have an audio recording of somebody typing on an ordinary computer keyboard for fifteen minutes or so, you can figure out everything they typed. [more]
Wednesday, 14 September 2005, 3:02 AM CET

Users play fast and loose with corporate PCs
Users are more likely to engage in risky internet behaviour at work because they reckon their IT department will protect them against viruses, worms, spyware, spam, phishing, and other security threats [more]
Wednesday, 14 September 2005, 3:00 AM CET

Basic security safeguards for Pocket PC
Passwords are your device's number one line of defense. Unless your device is password protected - at the least - a person who finds the device can do absolutely anything with it. [more]
Wednesday, 14 September 2005, 3:00 AM CET

The next 50 years of computer security
According to Alan Cox, we're just at the beginning of a long journey into getting security right. Eager for directions and a glimpse of the future, O'Reilly Network interviewed him about his upcoming keynote. [more]
Wednesday, 14 September 2005, 2:57 AM CET

Progress is slow on HIPAA security rules
Data mandates aren't driving health care companies to comply. [more]
Wednesday, 14 September 2005, 2:56 AM CET

IM security space gets more crowded
As IM security threats continue to mount, so too grow the solutions geared to protect against such threats. [more]
Tuesday, 13 September 2005, 4:00 PM CET

What's missing from outbound e-mail scanning
Outbound e-mail scanning has historically taken a backseat to inbound scanning. [more]
Tuesday, 13 September 2005, 3:37 PM CET

How secure is VoIP?
Phil Zimmerman, the inventor of Pretty Good Privacy (PGP), the application often credited with the introduction of cryptography to the masses, recently announced his intent to provide PGP-like software to ensure the privacy of voice over Internet Protocol (VoIP) communications. [more]
Tuesday, 13 September 2005, 3:10 PM CET

Businesses will have graded access to ID database
The Home Office said yesterday that businesses and public sector agency access to the national identity card database will be allowed on a graded basis, according to need. [more]
Tuesday, 13 September 2005, 3:09 PM CET

Gartner warns of offshore ID theft risk
A shortage of skilled labour for Indian call centres increases the risk of fraud and identity theft, analyst firm Gartner warned in a newly published study. [more]
Tuesday, 13 September 2005, 3:08 PM CET

Anti-spyware vendors tag Ask Jeeves software
Sunbelt Software and Facetime say that Ask Jeeves doesn't adequately inform users that the browser plug-ins are being installed. [more]
Tuesday, 13 September 2005, 1:59 PM CET

Mobile e-mail devices could pose threat to networks
Large organisations are leaving their networks vulnerable to attack by failing to police unofficial use of mobile e-mail devices by their staff, Gartner will warn this week. [more]
Tuesday, 13 September 2005, 1:58 PM CET

Securing sensitive data in outsourced environments
CIGNA needed a strong, flexible information security & data protection solution to support growing outsourcing initiatives & in-house applications, in addition to achieving HIPAA compliance. [more]
Tuesday, 13 September 2005, 1:55 PM CET

Phishers cast net for CompuServe users
Spoofed email message seeks account information. [more]
Tuesday, 13 September 2005, 1:49 PM CET

Bot herder websites in internet take-down
Bot herder websites that specialise in dumbing down the process of managing zombie networks of compromised Windows PCs are under attack. [more]
Tuesday, 13 September 2005, 1:46 PM CET

Microsoft takes aim at security 'myths'
Microsoft pushed security to the front of its Tech.Ed agenda on the Gold Coast this month, aiming to debunk what it claimed were common myths about IT security. [more]
Tuesday, 13 September 2005, 1:45 PM CET

Distortion to fool ID thieves
A trick reminiscent of a fun-house mirror may improve the security and privacy of access control technology that examines fingerprints, facial features and other personal characteristics. [more]
Tuesday, 13 September 2005, 1:44 PM CET

VoIP provider spills customer emails
Data leak at Packet8 turns customers into phishing targets. [more]
Tuesday, 13 September 2005, 1:39 PM CET

Smut and personal data left on resold PCs
Seven in 10 re-sold hard-drives and memory cards contain pornographic material, according to research by a UK-based data recovery firm based on the inspection of 1,000 hard disk drives over the last year. [more]
Tuesday, 13 September 2005, 1:38 PM CET

Getting to the bottom of those exhausting security issues
End-to-end secure identity and access management across multiple platforms is one of those niggling, time-consuming and complex problems that leaves even the most experienced IT administrator contemplating his or her future in IT. [more]
Tuesday, 13 September 2005, 1:37 PM CET

VoIP turns up the heat on firewalls
Because of VoIP, firewalls may never be the same. [more]
Monday, 12 September 2005, 7:55 PM CET

Red Cross works to better protect its networks from attacks, scams
CISO says relief agency seeks help as traffic surges. [more]
Monday, 12 September 2005, 7:53 PM CET

Fraud reveals workings of Internet theft
The illicit haul arrived each day by e-mail, the personal details of computer users tricked by an Internet thief: a victim's name, credit card number, date of birth, Social Security number, mother's maiden name. [more]
Monday, 12 September 2005, 7:51 PM CET

Key spyware call: where to protect?
With spyware threatening corporate networks, whether it be adware hogging bandwidth or malicious code logging personal data, network executives are being forced to define their defensive strategies. [more]
Monday, 12 September 2005, 1:38 PM CET

Microsoft pulls critical security patch
Undisclosed security vulnerability to remain unpatched. [more]
Monday, 12 September 2005, 10:16 AM CET

Security a top concern with online bankers
Online security has become a hot-button issue for banks of all sizes as online banking has gone from a luxury service to a required convenience for most customers. [more]
Monday, 12 September 2005, 10:11 AM CET

The cost of online anonymity
In the second report looking at privacy and the internet, Dan Simmons examines whether it is possible to be totally anonymous and asks if this is really a desirable thing. [more]
Monday, 12 September 2005, 10:08 AM CET

New course reveals hackers' tricks
Ethical hacking may seem an oxymoron to some, but not to Computer Power corporate training, which is bringing its Certified Ethical Hacker course to Australia. [more]
Monday, 12 September 2005, 10:04 AM CET

API protects secure software investments
A new application programming interface enables software and hardware developers to write single applications which can be used to target multiple security platforms. [more]
Saturday, 10 September 2005, 12:04 AM CET

What mutating spyware reveals about the future of security
pyware is literally evolving - mutating in the wild to avoid detection. [more]
Saturday, 10 September 2005, 12:00 AM CET

The six dumbest ideas in computer security
There's lots of innovation going on in security - we're inundated with a steady stream of new stuff and it all sounds like it works just great. [more]
Friday, 9 September 2005, 11:58 PM CET

Firefox flaw found: remote exploit possible
The vulnerability affects the new beta version released today. [more]
Friday, 9 September 2005, 9:08 PM CET

AOL awards $85,000 to spam sweepstakes winner
America Online played Robin Hood on Thursday, delivering more than $85,000 in cash and gold bars, as well as the keys to a Hummer H2, to 53-year-old welder Marc Daniels. [more]
Friday, 9 September 2005, 3:03 PM CET

Mac user virus vigilance required
The Mac community cannot afford to be complacent about security, as it's only a matter of time before a miscreant writes a Mac virus, experts warn. [more]
Friday, 9 September 2005, 2:05 PM CET

Firefox upgrade offers improved usability, security
Firefox upgrade offers improved usability, security [more]
Friday, 9 September 2005, 10:21 AM CET

Only one patch due in Microsoft's monthly security fix
A fix is expected on Tuesday. [more]
Friday, 9 September 2005, 10:17 AM CET

In defense of privacy
Today I'd like to discuss a fundamental principle that security specialists have to deal with all the time but which has a much broader social significance than discussions of, say, firewalls: privacy. [more]
Friday, 9 September 2005, 12:25 AM CET

Protecting identity information at the source
To stop identity theft while complying with privacy and security regulations, companies must protect confidential information at the source: databases. [more]
Friday, 9 September 2005, 12:20 AM CET

Locating files in real-time with rlocate
rlocate, by Rasto Levrinc, is based on slocate, which is an improvement on traditional locate, an old Unix command used to perform fast pathname searches. [more]
Friday, 9 September 2005, 12:18 AM CET

New bug hits Outlook and Explorer
No fix yet but Microsoft's on the case. [more]
Friday, 9 September 2005, 12:17 AM CET

Terrorists don't do movie plots
Sometimes it seems like the people in charge of homeland security spend too much time watching action movies. [more]
Friday, 9 September 2005, 12:15 AM CET

Pushing out security settings configured in the Registry
Unless you have been living under a rock, you have been watching the IT community stand up and take notice of all of the security issues that keep rising up. [more]
Friday, 9 September 2005, 12:13 AM CET

Hackers admit to wave of attacks
With their ringleader on the run, two cybervandals own up to using an army of compromised PCs to take down sites for commercial gain. [more]
Thursday, 8 September 2005, 1:16 PM CET

State of the spyware industry
Find out why spyware's underlying economy makes managing enterprise security a nightmare. [more]
Thursday, 8 September 2005, 1:15 PM CET

Big debate over small packets
Fernando Gont is nothing if not tenacious. [more]
Thursday, 8 September 2005, 1:14 PM CET

Spam may be a future threat to VoIP
Most companies now use the technology within their network. [more]
Thursday, 8 September 2005, 10:14 AM CET

Cisco gear hackable, vendor admits
Cisco has confirmed that routers and other devices running the newest versions of its Internetwork Operating System may be vulnerable to serious attack. [more]
Thursday, 8 September 2005, 10:13 AM CET

Popular policies: keeping storage secure
Secure storage of data has always been essential for any organisation, of whatever size. In the past this involved accurate filing of paper records, and then keeping the physical archive secure – whether it was simply locking a filing cabinet, or guarding an entire building. [more]
Thursday, 8 September 2005, 5:25 AM CET

EU ministers seek telecoms deal at security talks
EU interior ministers will try on Thursday to nail down a controversial accord giving police greater access to telecommunication data, a key focus of counter-terrorism work in the July London bombings.
Thursday, 8 September 2005, 4:05 AM CET

E-banking security provokes fear or indifference
A recent study by analyst Forrester Research has unearthed conflicting views about the safety or otherwise of online banking. [more]
Thursday, 8 September 2005, 3:59 AM CET

A changing landscape
With over 200 remotely exploitable vulnerabilities in Internet Explorer, the rise in attacks against end users for their banking credentials was becoming common. [more]
Thursday, 8 September 2005, 3:00 AM CET

Staff smartcard to boost Underground safety
London Underground to appoint IT supplier. [more]
Thursday, 8 September 2005, 2:45 AM CET

Clarke: Europe must trade civil liberties for security
British Home Secretary Charles Clarke has warned that European citizens will have to accept that civil liberties may have to be bartered away in exchange for protection from terrorists and organised criminals. [more]
Thursday, 8 September 2005, 2:37 AM CET

Users desert online banks
More than half a million UK internet users stop online banking. [more]
Thursday, 8 September 2005, 2:34 AM CET

The real state of VoIP security
Consider the source of warnings about VoIP security carefully. [more]
Thursday, 8 September 2005, 2:05 AM CET

Continuous data protection a better backup option
Blogs and discussion forums have been abuzz about continuous data protection solutions designed to meet the needs of SMBs. They have continuous protection of data. [more]
Wednesday, 7 September 2005, 5:28 PM CET

Secure systems vs. satisfied staff
Companies walk a difficult line when they try to determine how to handle their employees' computer use. [more]
Wednesday, 7 September 2005, 3:07 PM CET

US losing battle against identity theft
Existing laws not offering sufficient protection, warns pressure group. [more]
Wednesday, 7 September 2005, 2:06 PM CET

Cores to power fingerprint security
Biometric security specialist Upek has licensed the ARC 625D processor core for its next-generation line of TouchStrip fingerprint authentication products. [more]
Wednesday, 7 September 2005, 2:05 PM CET

Internet satellite imagery under fire over security
Asian governments have expressed security concerns about easy access to detailed satellite images on the Internet, such as those used by rescuers in New Orleans, saying the technology could endanger sensitive sites. [more]
Wednesday, 7 September 2005, 2:04 PM CET

Ireland celebrates first anti-spam conviction
Ireland's Data Protection Commissioner, Billy Hawkes, has secured his first conviction for a breach of the country's anti-spam law. [more]
Wednesday, 7 September 2005, 1:14 PM CET

Information security metrics
Information security metrics don't have to rely on heavy-duty math to be effective. [more]
Wednesday, 7 September 2005, 1:02 PM CET

An illustrated guide to IPSec
IPSec is a suite of protocols for securing network connections, but the details and many variations quickly become overwhelming. [more]
Wednesday, 7 September 2005, 12:59 PM CET

Draconian security policies create their own problems
While security is important, clamping down too hard can lead to an employee exodus. [more]
Wednesday, 7 September 2005, 12:57 PM CET

Upgrading to Apache 2
Apache 2 offers a number of new features and improvements over the Apache 1.3 series, but the upgrade can seem daunting to those who haven't had much (or any) experience with Apache 2. [more]
Wednesday, 7 September 2005, 12:55 PM CET

Intel invests in Czech security company
Grisoft s.r.o. has 25 million customers. [more]
Wednesday, 7 September 2005, 12:53 PM CET

The four most common security dangers
Sometimes the worse security dangers, and the ones you forget about, are the ones in plain sight. Here are the four most common security dangers. [more]
Tuesday, 6 September 2005, 5:16 PM CET

Dutch ISPs sue government for wiretapping costs
A large group of ISPs and telecom operators in the Netherlands is to sue the Dutch Government for the cost of installing wiretaps. [more]
Tuesday, 6 September 2005, 5:15 PM CET

Software security - building it right
Software security is a term that all of us consider, more or less, an oxymoron. Failures in software that we use are a daily occurrence and one that most of us have resigned ourselves to. Basically software sucks. [more]
Tuesday, 6 September 2005, 5:15 PM CET

SurfControl hits trough
Shares in UK-based censorware outfit SurfControl slipped 12 per cent this morning after the firm's annual results came in at the bottom end of expectations. [more]
Tuesday, 6 September 2005, 5:14 PM CET

The Internet's new fear factor
In his 14 years as a virus hunter, Mikko Hypponen had seen a lot of ugly stuff on the Internet, but nothing quite like this. [more]
Tuesday, 6 September 2005, 1:54 AM CET

Email security - what are the issues?
As email becomes more prevalent in the market, the importance of email security becomes more significant. In particular, the security implications associated with the management of email storage, policy enforcement, auditing, archiving and data recovery. [more]
Monday, 5 September 2005, 6:53 PM CET

'Big Brother'-like monitoring growing at work
In addition to lost productivity, employers are worried that the slacker surfers will inadvertently download viruses or malware, further harming productivity when IT is disabled. [more]
Monday, 5 September 2005, 6:32 PM CET

The mobility threat
Security threats to and by mobile devices are more pervasive than many might think. Things may not be what they seem in today’s sophisticated mobile device industry. [more]
Monday, 5 September 2005, 6:30 PM CET

Collaboration helps nab cybercriminals
Victimized businesses need to fess up to law-enforcement agencies. [more]
Monday, 5 September 2005, 4:54 PM CET

New technology may increase ID theft, scientist says
But ID cards and chip and pin technology will force fraudsters to be more creative. [more]
Monday, 5 September 2005, 4:52 PM CET

Tighter security for PDAs
The portability of handhelds makes them attractive to business users, but it also makes them more likely to be lost or stolen or for data to be corrupted. [more]
Monday, 5 September 2005, 4:51 PM CET

Google hacking
Johnny Long says he has never met a Google employee. And yet he is at the center of a community of security experts and search engine enthusiasts that might be developing some of the most interesting uses of Google technology today. [more]
Monday, 5 September 2005, 4:42 PM CET

Hi-tech no panacea for ID theft woes
Attempts to thwart identity theft and fraud through technology advances are likely to prove counterproductive, a British academic warns. [more]
Monday, 5 September 2005, 4:39 PM CET

A close look at web browser security
How to train Microsoft's infamously weedy web browser to stand up to online threats. [more]
Monday, 5 September 2005, 4:37 PM CET

Top 10 words used in spam
Analysis of 54,202 spam e-mails yields this list of frequently used words, only some of which can actually be pronounced. [more]
Monday, 5 September 2005, 2:02 AM CET

Morocco to try suspected computer worm author
Farid Essebar, 18, is slated to go on trial Sept. 13. [more]
Monday, 5 September 2005, 1:56 AM CET

Trusted Computing standards won't apply to Vista
Microsoft is dragging its heels about applying guidelines it helped develop for trusted computing to the next version of Windows, according to noted crypto guru Bruce Schneier. [more]
Friday, 2 September 2005, 8:18 PM CET

PayPal phishing video example
Watch this video about a PayPal phishing site. It looks more like PayPal than Paypal does some days. [more]
Friday, 2 September 2005, 6:39 PM CET

Top 10 mobile device privacy policies
People are storing more types of confidential information on mobile computing devices, and an expert in the field tells you how to keep it all under wraps. [more]
Friday, 2 September 2005, 6:32 PM CET

Securing the point of use
The future of data security lies at the point of use. [more]
Friday, 2 September 2005, 6:31 PM CET

419-lite fraudsters target Camelot
Advanced fee fraudsters are turning their attention to the UK's National Lottery with scam emails that pose as winning notifications. [more]
Friday, 2 September 2005, 6:28 PM CET

Security, compliance and management converge
What the convergence of security, compliance and management means. [more]
Friday, 2 September 2005, 3:57 PM CET

DVD Jon hacks Media Player file encryption
Norway's best known IT export, DVD Jon, has hacked encryption coding in Microsoft's Windows Media Player, opening up content broadcast for the multimedia player to alternative devices on multiple platforms. [more]
Friday, 2 September 2005, 12:00 PM CET

Evaluating network-security consultants
Beyond the big consultancies, smaller regional operators can be a boon to companies looking for security help, said Gartner Group's John Pescatore. Not only are the smaller companies usually less expensive, but also consultants that are just around the block rather than a few states over can be on hand more readily. [more]
Friday, 2 September 2005, 11:50 AM CET

MS wrong on security claims: Red Hat
Red Hat is accusing Microsoft of getting its facts wrong in its latest attack on Linux security. [more]
Friday, 2 September 2005, 1:19 AM CET

A new way to bypass Windows heap protections
In this paper, we'll remind readers of the principles of classic heap overflow exploitation, and explain why these techniques do not work with the newest Windows platforms. [more]
Friday, 2 September 2005, 1:16 AM CET

Are companies prepared for fallout from a security breach?
There are some very positive trends in corporate privacy and data-protection practices. [more]
Friday, 2 September 2005, 1:13 AM CET

MyTob and NetSky-P dominate August viral charts
Despite all the publicity about the Zotob the NetSky-P virus continued to dominate anti-virus charts in August. [more]
Thursday, 1 September 2005, 2:14 PM CET

Spammers bet on a summer of gambling
Inboxes deluged with junk mail relating to betting. [more]
Thursday, 1 September 2005, 2:14 PM CET

Online users must be rid of hackers and phishers
Computing talks to Microsoft's chief privacy strategist about web fraud. [more]
Thursday, 1 September 2005, 1:08 PM CET

Never forget another password
Netizens are now collectors of secrets, whether they are good at keeping them or not. [more]
Thursday, 1 September 2005, 1:08 PM CET

Microsoft bolsters video content security in Vista
Microsoft plans to include new ways to protect video content in the next version of its Windows desktop operating system (OS) in an effort to position the OS as a platform for home digital entertainment systems. [more]
Thursday, 1 September 2005, 12:45 PM CET

Best practices for pervasive Web services security
How can enterprises address the security threats inherent in Web services? By following the best practices described in this paper, enterprises can ensure the benefits of Web services outweigh the risks. [more]
Thursday, 1 September 2005, 12:44 PM CET

The truth about security
Mutton dressed as lamb? Are software products riddled with holes? [more]
Thursday, 1 September 2005, 12:38 PM CET

Exploiting Cisco with FX
This interview with FX discusses Cisco IOS exploitation, Michael Lynn's work, and what FX believes can be done when hacking IOS. [more]
Thursday, 1 September 2005, 12:26 PM CET

Phone virus spreads through Scandinavian company
F-Secure says viruses are becoming more common in mobile phones. [more]
Thursday, 1 September 2005, 12:10 PM CET

Scammers jump on Hurricane Katrina
Natural disaster exploited in latest cons. [more]
Thursday, 1 September 2005, 12:09 PM CET

Questions surround smartphone security
"Few wireless PDAs meet our security requirements right out of the box," says Tamara Box, consultant with the U.S. Department of Veterans Affairs, which has seen rising use of wireless PDAs in the last year among healthcare staff. [more]
Thursday, 1 September 2005, 12:08 PM CET


Why IT security is broken and how math can save it

Posted on article.php?id=2107  |  Stuart McClure, CEO at Cylance, talks about how the information security industry has evolved when it comes to detecting bad guys, but it's being mostly reactive and not proactive.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.


Wed, Aug 27th