Archive
Browse the full archive of Computer Weekly online content - see our most recent articles listed below, or browse by year of publication.
2005 Stories
- 
                        December 22, 2005
                        22Dec2005
                        News
Gaining access using application and operating system attacksIn this excerpt from Chapter 7 of Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, Second Edition, authors Ed Skoudis and Tom Liston explain how security professionals can use exploit frameworks to their ... Continue Reading 
- 
                        December 21, 2005
                        21Dec2005
                        News
Sony struggles to regain trustThe company is trying to mend a reputation bruised over its antipiracy practices. One advocate for online civil liberties explains why redemption is a long way off. Continue Reading 
- 
                        December 20, 2005
                        20Dec2005
                        News
Guidance turns investigative tools on itselfThe forensics software firm says it was compromised by hackers in November. It's just one in a growing list of companies admitting to recent attacks or lax security. Continue Reading 
- 
                        December 18, 2005
                        18Dec2005
                        News
Trio of trouble: Malcode targets Windows, IM usersAV firms warn IT shops to guard against Dasher, Bagle and Banbra. Dasher targets a Windows flaw patched in October, while Banbra spreads through IM. Continue Reading 
- 
                        December 14, 2005
                        14Dec2005
                        News
Flaws reported in Trend Micro ServerProtectStorage and security managers should be wary of vulnerabilities in the AV product that could enable a denial-of-service and malicious code execution. Workarounds are available. Continue Reading 
- 
                        December 14, 2005
                        14Dec2005
                        News
Hospital ditches EMC Centera for long-term archivingUHCS in Augusta, Ga., is replacing its Centera archiving system from EMC with IBM's GMAS product after performance, reliability and cost issues forced it to seek alternatives. Continue Reading 
- 
                        December 14, 2005
                        14Dec2005
                        News
Roundup: 2005's 'curious malicious code'These viruses, worms and Trojans sometimes escaped our notice. But it didn't get past one antivirus vendor, who rounded up some of the year's stranger offerings from the underground. Continue Reading 
- 
                        December 12, 2005
                        12Dec2005
                        News
Two Windows patches coming, IE fix uncertainIt remains to be seen whether the software giant on Dec. 13 will address an outstanding Internet Explorer issue that is currently the target of a malicious Trojan. Continue Reading 
- 
                        December 12, 2005
                        12Dec2005
                        News
Titan Rain shows need for better trainingSANS says the Chinese-based attacks demonstrate the growing sophistication of hackers, and the need for IT admins who can articulate the dangers to execs. Continue Reading 
- 
                        December 12, 2005
                        12Dec2005
                        News
Experts: Encryption not a security cure-allEncrypting data offers some protection, but secure applications require much more than cryptography. Experts weigh in on your security options. Continue Reading 
- 
                        December 08, 2005
                        08Dec2005
                        News
IP cloaking becoming a business necessityJust by browsing your competitor's Web site, you might be giving away your company's most guarded secrets. Experts offer advice for countering the subterfuge and keeping secrets safe. Continue Reading 
- 
                        December 07, 2005
                        07Dec2005
                        News
Security pros gain ground in the board roomExecutives are paying more attention to their IT security managers and taking more responsibility for online threats against their companies, according to a new study. Continue Reading 
- 
                        December 06, 2005
                        06Dec2005
                        News
Cybersecurity policy takes cooperation, trust, experts sayAt the Infosecurity confab, experts explain why sharing information -- even when it's embarrassing -- is vital to securing not only corporations, but also the national infrastructure. Continue Reading 
- 
                        November 30, 2005
                        30Nov2005
                        News
Out-of-cycle IE patch may be imminentMicrosoft may release a critical Internet Explorer fix before the next Patch Tuesday, amid reports that malicious code is targeting a memory corruption flaw. Continue Reading 
- 
                        November 29, 2005
                        29Nov2005
                        News
By the numbers: The new SOX breakdownSOX spending for 2006 is expected to be on par with last year but it's not quite dÉjÀ vu all over again. More dough will go to technology. Continue Reading 
- 
                        November 28, 2005
                        28Nov2005
                        News
Who owns and administers the internet's addresses?Given that IPv4 addresses are a finite resource, we can expect concerns over their distribution to increase in the coming years. Continue Reading 
- 
                        November 28, 2005
                        28Nov2005
                        News
Step 6: Configuring wireless clientsWith wireless networks proliferating it is a good idea to understand what it takes to build a VPN for a wireless gateway. Contributor and Microsoft MVP Brien Posey details the necessary steps in this step-by-step guide. Continue Reading 
- 
                        November 22, 2005
                        22Nov2005
                        News
Influential survey says security 'set back by 6 years'Update: The SANS Top 20 vulnerability list for 2005 shows the bad guys attacking flawed apps and paying more attention to network holes. Continue Reading 
- 
                        November 21, 2005
                        21Nov2005
                        News
Wireless security: Public Wi-Fi could open security holesA Michigan county is working to give everyone within its borders wireless Internet access. But when it comes to security, users are on their own. Continue Reading 
- 
                        November 20, 2005
                        20Nov2005
                        News
Wireless security crucial to railway safetyA transportation firm uses wireless technology to keep the trains running on time. But securing mobile devices isn't easy when they're spread across the globe. Continue Reading 
- 
                        November 16, 2005
                        16Nov2005
                        News
Step 3: GnuPG and WinPT: Setup
- 
                        November 16, 2005
                        16Nov2005
                        News
Step 2: Public keypairs
- 
                        November 16, 2005
                        16Nov2005
                        News
Wireless security: Companies deal with software updatesA health care provider found it could use wireless technology to dramatically boost patient care. But first it had to figure out how to deploy security updates over a wireless network. Continue Reading 
- 
                        November 16, 2005
                        16Nov2005
                        News
Step 4: Encrypting e-mail in WinPT
- 
                        November 14, 2005
                        14Nov2005
                        News
Hackers installing keyloggers at a record rateiDefense researchers have found that keylogger infections are up 65% over the year before, putting the private data of tens of millions of users at risk. Continue Reading 
- 
                        November 14, 2005
                        14Nov2005
                        News
Sony rootkit uninstaller causes bigger threatPrinceton researchers say a security hole that appears when users try to remove Sony's copy protection software presents an even greater risk than the original rootkit. Continue Reading 
- 
                        November 14, 2005
                        14Nov2005
                        News
Demand for development skills soars as firms seek business edgeComputer Weekly salary survey shows IT departments eager to secure skills for the future. Continue Reading 
- 
                        November 10, 2005
                        10Nov2005
                        News
Security Bytes: FTC cracks down on alleged spyware distributorsPatches fix serious RealPlayer flaws, IM malcode launches phishing attacks; Microsoft warns of Macromedia Flash flaw; Liberty Alliance pushes stronger authentication; FEMA data security is in question; patches fix Veritas flaws and TransUnion ... Continue Reading 
- 
                        November 10, 2005
                        10Nov2005
                        News
IBM targets SMEs with storage productsIBM has launched the first in a range of new storage products aimed at the SME market, following its link-up with Network Appliance. Continue Reading 
- 
                        November 09, 2005
                        09Nov2005
                        News
Trojans target Sony DRM and WindowsSecurity researchers track two new Trojan horses. One exploits the Sony DRM program. The other could possibly take aim at the Windows flaw Microsoft patched this week. Continue Reading 
- 
                        November 08, 2005
                        08Nov2005
                        News
Sony takes second stab at DRM patchBut a top executive's response to criticism over the company's use of rootkit technology has added fuel to the backlash. Continue Reading 
- 
                        November 06, 2005
                        06Nov2005
                        News
Hacking Windows: MSRPC vulnerabilitiesIn this excerpt from "Hacking Exposed, Fifth Edition: Network Security Secrets & Solutions," authors Stuart McClure, Joel Scambray and George Kurtz introduce MSRPC vulnerabilities and countermeasures. Continue Reading 
- 
                        October 24, 2005
                        24Oct2005
                        News
Reporter's Notebook: NYC 'controls the software industry'At Information Security Decisions: a security "rock star" rages against the Microsoft machine; banging the drum for enterprise security; a sour note on zero-day exploits. Continue Reading 
- 
                        October 20, 2005
                        20Oct2005
                        News
Author delves into novel attack methodologiesReview of Silence on the Wire, a book about security attack methodologies such as passive fingerprinting. Continue Reading 
- 
                        October 19, 2005
                        19Oct2005
                        News
Elements of a data protection strategyIn this excerpt from Data Protection and Lifecycle Management, Tom Petrocelli addresses the importance of securing data for regulatory compliance and outlines the five components of a data protection strategy. Continue Reading 
- 
                        October 17, 2005
                        17Oct2005
                        News
How avian flu could threaten IT securityExperts say a potential bird flu pandemic could have a disastrous effect on IT infrastructures. But if companies plan well, those infrastructures could also help minimize chaos. Continue Reading 
- 
                        October 12, 2005
                        12Oct2005
                        News
Quiz: What's your infosec IQ?We've collected our toughest questions to see how well you stand up to a challenge. Put your knowledge to the test and let us know how you do. Continue Reading 
- 
                        October 12, 2005
                        12Oct2005
                        News
Symantec fixes 'critical' Veritas flawAttackers could launch malicious code by exploiting a security hole in Veritas NetBackup servers and clients. But Symantec has released a fix. Continue Reading 
- 
                        October 10, 2005
                        10Oct2005
                        News
Don't discount software distribution sites as attack vectorsThere's a potential downside to update sites, which offer virtually untapped riches to bad guys wanting to compromise your network. Just ask the author. Continue Reading 
- 
                        October 07, 2005
                        07Oct2005
                        News
Service approach will bring benefits to applications development says GartnerService-oriented development of applications (SODA) is the best way to approach globally distributed application development and maintenance, according to a new report by Gartner. Continue Reading 
- 
                        October 03, 2005
                        03Oct2005
                        News
How to break into a computer that is right at your fingertipsStressing the importance of physical security, Joel Dubin explains how a hacker can bypass a BIOS password and break into a computer. Continue Reading 
- 
                        October 03, 2005
                        03Oct2005
                        Tip
Zoning 101: Why zone?Zoning can offer a number of benefits for your SAN. This tip details the advantages of zoning and offers an explanation of the different methods. Continue Reading 
- 
                        September 29, 2005
                        29Sep2005
                        News
Find out how to bridge the communications gapCommunications between the business and IT will be the subject of the next meeting of the Computer Weekly 500 Club (CW500). Continue Reading 
- 
                        September 27, 2005
                        27Sep2005
                        News
Secure your extended enterpriseHow do you achieve the fine balance between ensuring that there is truly free access to sensitive information, without sacrificing security? Continue Reading 
- 
                        September 26, 2005
                        26Sep2005
                        News
NHS trust creates wireless recordUniversity College London Hospitals (UCLH) NHS Trust has created the UK's largest single wireless network to support 7,000 users across eight hospitals. Continue Reading 
- 
                        September 26, 2005
                        26Sep2005
                        News
IT spending at midsized companies: How much does size matter?
- 
                        September 26, 2005
                        26Sep2005
                        News
Secure the interests of your extended enterpriseHow do you achieve the fine balance between ensuring that there is truly free access to sensitive information and applications from both inside and outside the firewall, without sacrificing security? Continue Reading 
- 
                        September 26, 2005
                        26Sep2005
                        News
Gartner stresses SOA and WS importanceLeading analyst stresses importance of SOA and web services Continue Reading 
- 
                        September 22, 2005
                        22Sep2005
                        News
Who best to avert data security disaster: government or business?People look to government to prevent catastrophe. But in the Information Age, some of those people, namely those working in IT shops, need to do their part to protect us. Continue Reading 
- 
                        September 22, 2005
                        22Sep2005
                        News
Telework key to surviving security disaster, expert saysCybersecurity Industry Alliance Executive Director Paul Kurtz explains why telework may be crucial to surviving The Big One. Continue Reading 
- 
                        September 21, 2005
                        21Sep2005
                        News
Leave no trace: Understanding attackers' motivesThis excerpt from Chapter 1 of "Rootkits: Subverting the Windows Kernel," explains the purpose of back doors and how hackers use them, as well as how stealth plays a major role in most successful attacks. Continue Reading 
- 
                        September 21, 2005
                        21Sep2005
                        News
IT infrastructure risks key to averting major cyberattackPredictions of a cataclysmic disaster have been around for awhile. But one security officer cites reasons why the Internet can never be brought down. Continue Reading 
- 
                        September 21, 2005
                        21Sep2005
                        News
Catastrophic cyberattack unlikely, experts sayPredictions of a cataclysmic disaster have been around for awhile. But one security officer cites reasons why the Internet can never be brought down. Continue Reading 
- 
                        September 20, 2005
                        20Sep2005
                        News
SAS drives product roundupSerial-attached SCSI (or SAS) drives offer significant storage capacity at a much lower cost, while maintaining reasonable performance. Find out who the vendors are in this market. Continue Reading 
- 
                        September 20, 2005
                        20Sep2005
                        News
Security tools help reduce insider threat.
- 
                        September 20, 2005
                        20Sep2005
                        News
Insider threat seen as biggest data security issueWhether they oversee physical or online defenses, security officers say the disaster scenario that scares them most begins with an insider with malicious intentions. Continue Reading 
- 
                        September 19, 2005
                        19Sep2005
                        News
Spy vs. SpyExcerpt from Chapter 6 of Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day. Continue Reading 
- 
                        September 18, 2005
                        18Sep2005
                        News
Ensure that legal responsibilities are clear -- Especially when trouble strikesExcerpt from Chapter 15 of Information Nation Warrior: Information Management Compliance Boot Camp. Continue Reading 
- 
                        September 18, 2005
                        18Sep2005
                        News
CCSP courses, exam changing next monthThose seeking Cisco's security credential and specialization in VPN, firewall and IDS will soon follow different curricula that better reflect the vendor's current product lines. Continue Reading 
- 
                        September 13, 2005
                        13Sep2005
                        News
Ethernet users given greater product interoperabilityA new network hardware testing standard will encourage enterprises, service providers and telcos to adopt cheaper and more flexible Ethernet technology for data, voice and video connectivity. Continue Reading 
- 
                        September 13, 2005
                        13Sep2005
                        News
Ofcom liberates BT to offer bespoke pricingOfcom has announced proposals to allow BT to offer large business customers bespoke call prices, which should lead to discounts for some companies. Continue Reading 
- 
                        September 13, 2005
                        13Sep2005
                        In Depth
IT professionals set for annual charity sleep-outSenior IT professionals are gearing up to on London's Embankment near Tower Bridge on Friday 23 September 2005. The aim is to raise more than £250,000 for disadvantaged children. Continue Reading 
- 
                        September 11, 2005
                        11Sep2005
                        News
VoIP turns up the heat on firewallsNew research shows that many organizations are increasingly concerned about VoIP security and plan to augment their firewalls within the next year, changing the landscape of the firewall market. Continue Reading 
- 
                        September 09, 2005
                        09Sep2005
                        News
Sponsor's Editorial - Making marketing more relevantResponsys, a premier global provider of on-demand email and lifecycle marketing solutions, has announced Interact 5, the latest version of the company’s email marketing automation software. Continue Reading 
- 
                        September 06, 2005
                        06Sep2005
                        News
Firewalls can help or hurt, so plan carefully
- 
                        September 05, 2005
                        05Sep2005
                        News
Which data backup software is best? - Page 2
- 
                        September 05, 2005
                        05Sep2005
                        News
Which data backup software is best? - Page 4
- 
                        September 05, 2005
                        05Sep2005
                        News
Which data backup software is best?
- 
                        September 05, 2005
                        05Sep2005
                        News
Which data backup software is best? - Page 3
- 
                        September 05, 2005
                        05Sep2005
                        News
IE 7.0 may usher in wave of RSS exploitsExperts warn that Web-feed enhancements in Microsoft's new Web browser may be just the thing crackers need to compromise networks and private data. Continue Reading 
- 
                        September 05, 2005
                        05Sep2005
                        News
Extending perimetersThe news that, up until 2006, 70% of successful wireless local area network (WLAN) attacks will be because of the misconfiguration of WLAN access points and client software is disquieting on a number of levels. Continue Reading 
- 
                        September 01, 2005
                        01Sep2005
                        News
Symantec glitch could expose user names, passwordsSymantec announced a fix for a flaw in AntiVirus Corporate Edition Friday afternoon. The security hole could be exploited to view user names and passwords. Continue Reading 
- 
                        September 01, 2005
                        01Sep2005
                        Tip
Archiving unstructured dataCompanies must find ways to automate and simplify the process of archiving files and e-mail messages. ECM software addresses this large pool of unstructured data. Continue Reading 
- 
                        August 30, 2005
                        30Aug2005
                        News
Myfip's Titan Rain connectionLURHQ researchers say the Myfip worm is a good example of the malcode Chinese hackers are using in the so-called Titan Rain attacks against U.S. government networks. Continue Reading 
- 
                        August 30, 2005
                        30Aug2005
                        News
Antivirus can introduce dangerous network security holes into any OSAV software is one of the most basic security steps available. It's also yet another gateway for security breaches. Continue Reading 
- 
                        August 30, 2005
                        30Aug2005
                        News
Passive fingerprinting: Applications and preventionIn this excerpt from the book Silence on the Wire, author Michal Zalewski discusses both malicious and beneficial uses for passive fingerprinting, and how to prevent successful passive fingerprinting on your network. Continue Reading 
- 
                        August 29, 2005
                        29Aug2005
                        News
Storage area network quizIt's all about the storage area network (SAN) -- man. The more you know, the easier it is. Take our SAN quiz and find out where you stand as a SAN guru. Continue Reading 
- 
                        August 26, 2005
                        26Aug2005
                        News
High profile breach brings security to top of agendaThere’s nothing like an apparent breach at a global company to concentrate the mind when it comes to information and data security. Continue Reading 
- 
                        August 23, 2005
                        23Aug2005
                        News
HP sales boost as restructuring costsHP reported a 10% increase in sales for the third quarter, and said it would spend $900m (£530m) on redundancy costs in the final quarter. Continue Reading 
- 
                        August 16, 2005
                        16Aug2005
                        News
Reduce risks of disaster recovery testingUntested business continuity plans can leave your firm in the lurch, but taking down live environments is risky and complicated. Continue Reading 
- 
                        August 10, 2005
                        10Aug2005
                        News
Strategic Storage: Storage security -- Change old habits and stop data theft
- 
                        August 06, 2005
                        06Aug2005
                        News
Trusted Computing Group releases server specsThe Trusted Computing Group released a new set of trusted server specifications it hopes will help vendors protect their platforms against security breaches. Continue Reading 
- 
                        August 02, 2005
                        02Aug2005
                        News
Raising risk prospects with a new SQL injection threat"Inference attacks" could deliver up your so-called secure database to an attacker. Continue Reading 
- 
                        July 31, 2005
                        31Jul2005
                        News
Attack: USB could be the death of meSeemingly innocent Universal Serial Bus driver bugs may allow device attacks that many won't see coming, according to Black Hat presenters. Continue Reading 
- 
                        July 28, 2005
                        28Jul2005
                        In Depth
VoIP and IPT are hot tickets for the IT industryVoice over IP (VoIP) and IP telephony (IPT) are the hot tickets in the current IT industry. In the space of two weeks in late May and June 2005, two major European trade shows — VON 2005 and VoIP for Business —have each exhibited a welter of ... Continue Reading 
- 
                        July 28, 2005
                        28Jul2005
                        In Depth
Lost at sea: securing the channelAs attacks seem to proliferate almost unabated, it’s worrying to think that of the three interested parties in the security technology market — the technology makers, the technology sellers and the technology users—not everyone shares a common view ... Continue Reading 
- 
                        July 28, 2005
                        28Jul2005
                        News
Sarbox compliance costing companiesCompanies’ required investments to attain compliance with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, according to the Information Security Forum (ISF). Continue Reading 
- 
                        July 27, 2005
                        27Jul2005
                        News
Combining technology and social engineering: Hacking behind barsIn this excerpt from Chapter 11 of "The Art of Deception: Controlling the Human Element of Security," authors Kevin Mitnick and William L. Simon begin a story that shows how social engineering can be used with technology. Continue Reading 
- 
                        July 27, 2005
                        27Jul2005
                        News
Cisco, Black Hat litigation comes to a closeThe vendor and partner ISS settle their dispute over a presentation that resulted in criminal charges and cease and desist orders. Continue Reading 
- 
                        July 26, 2005
                        26Jul2005
                        News
VeriSign raises stakes in battle for threat intelligenceNot to be outdone by 3Com's "Zero-Day Initiative," VeriSign says it'll shell out more cash for hackers who provide vulnerability intelligence. Continue Reading 
- 
                        July 26, 2005
                        26Jul2005
                        News
Experts weigh in on spyware's defining momentWe asked IT professionals to review the spyware definitions proposed by a coalition of tech firms and security organizations. They found plenty of room for improvement. Continue Reading 
- 
                        July 26, 2005
                        26Jul2005
                        News
VoIP encryption to have 'Pretty Good Privacy
- 
                        July 25, 2005
                        25Jul2005
                        News
HP attempts to reassures anxious customers on impact of job losses
- 
                        July 24, 2005
                        24Jul2005
                        News
Authentication takes a bite out of spamNetwork and messaging experts offer helpful ammunition for network managers waving the white flag in the battle against spam. Continue Reading 
- 
                        July 22, 2005
                        22Jul2005
                        In Depth
Riding the wave of changeCIOs can thrive as pace of change quickens, argues Des Lee Continue Reading 
- 
                        July 22, 2005
                        22Jul2005
                        In Depth
Business continuity keeps companies runningAs we speak, it appears that disruption to IT services by the London bombings was minimised due to effective and realistic business continuity strategies. Sally Flood sees how you construct them. Continue Reading 
- 
                        July 21, 2005
                        21Jul2005
                        News
HP slashes jobs and shuts enterprise divisonHP has announced 14,500 redundancies and will close down its separate enterprise sales division as part of its attempt to streamline operations and cut costs. Continue Reading 
- 
                        July 21, 2005
                        21Jul2005
                        News
Users look for value boost from Microsoft licence rejigSoftware Assurance needs to offer better support, say IT directors Continue Reading 
- 
                        July 21, 2005
                        21Jul2005
                        News
Sarbox draining corporate security budgetsCorporate investment to comply with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, according to the Information Security Forum (ISF). Continue Reading 
- 
                        July 21, 2005
                        21Jul2005
                        News
Can alcohol mix with your key personnel?I persuaded our MD to hire a dedicated IT security expert. I am pleased with his work, but on several occasions he has smelled strongly of drink. How do I nip this in the bud? Continue Reading 

 
		