News

Antivirus, firewall and IDS products

  • December 19, 2006 19 Dec'06

    Microsoft releases Vista APIs to security vendors

    Microsoft released a draft set of programming interfaces allowing security vendors to develop software using the Windows kernel on 64-bit systems.

  • December 18, 2006 18 Dec'06

    VoIP hacking exposed in new book

    VoIP hacking is a reality, and in a new book, two VoIP security experts outline the tools and tricks to avoid a system-crushing hack.

  • December 17, 2006 17 Dec'06

    Criminals find safety in cyberspace

    A new report from McAfee shows how criminals are enjoying a sense of safety and anonymity in cyberspace that they never had on the street. And they're making more money.

  • December 13, 2006 13 Dec'06

    Review: Sky's the limit with Skybox View 3.0

    Hot Pick: Skybox View 3.0 offers a unique and flexible approach for assessing and managing specific threats and overall risk to your digital assets.

  • December 06, 2006 06 Dec'06

    MP3 search site pushes spyware, watchdogs say

    A Web site that gives users the ability to search for MP3s contains programs that behave like spyware, according to the Center for Democracy and Technology and StopBadware.org.

  • December 03, 2006 03 Dec'06

    Security Bytes: Phishing worm spreads through MySpace

    Round up of security news

  • November 30, 2006 30 Nov'06

    Oracle responds to security critics

    Security Blog Log: Oracle takes on researchers who have criticised its security procedures in recent weeks. Meanwhile, Symantec warns of new zombie malware.

  • November 28, 2006 28 Nov'06

    Symantec fixes NetBackup Puredisk flaw

    An unauthorised user could launch malicious code by exploiting a flaw in Symantec's Veritas NetBackup PureDisk product. But a fix is available.

  • November 22, 2006 22 Nov'06

    Zango defying FTC agreement, researchers say

    This week in Security Blog Log: Two researchers accuse Zango of unsavory adware tactics, despite the company's pledge to clean up its act.

  • November 21, 2006 21 Nov'06

    BakBone brushes up replication software

    BakBone's NetVault Replicator version 5.0 includes automatic configuration of replication for remote sites, a capacity planning tool and a higher performance data movement engine.

  • November 13, 2006 13 Nov'06

    Trojan poses as Adobe software update

    The Trojan keylogger comes in an email that asks users to download the latest version of Adobe Reader. It then tries to steal the user's confidential information.

  • November 06, 2006 06 Nov'06

    How to manage encryption keys

    Encryption is an effective way to secure data, but the encryption keys used must be carefully managed to ensure data remains protected and accessible when needed.

  • November 01, 2006 01 Nov'06

    Tor network privacy could be cracked

    The Tor network is used by those who want to keep their IP addresses private. But new research shows that it's possible to compromise the system and unmask the user.

  • October 26, 2006 26 Oct'06

    Achieving compliance: a real-world roadmap

    A security manager's responsibilities extend beyond the technical aspects of the job. These days, effective governance and compliance are just as essential.

  • October 23, 2006 23 Oct'06

    What storage managers are buying and why, page 7

    What storage managers are buying and why

  • October 22, 2006 22 Oct'06

    Enhanced Identity and Access Management

    From consolidating directories to automating provisioning and rolling out single sign-on, these sessions identify how leading organizations are strengthening authorization and enforcing access controls.

  • October 22, 2006 22 Oct'06

    Snyder On Security: An insider's guide to the essentials

    Joel Snyder, senior partner with consultancy Opus One, provides an in-depth look at information security trends and technologies.

  • October 15, 2006 15 Oct'06

    Microsoft caves to pressure over Vista security

    To accommodate third-party security vendors and appease antitrust regulators in Europe, Microsoft will make some final tweaks to Windows Vista.

  • October 12, 2006 12 Oct'06

    Microsoft to fold security into Windows division

    The software giant said the move would make future Windows development efforts more efficient. The changes take effect after Microsoft releases Vista.

  • October 11, 2006 11 Oct'06

    Brief: Malicious Web site poses as Google

    A malicious Web site poses as Google's Italian site, but attempts to install malicious ActiveX controls on victim's machines and ultimately redirect them to adult content.

  • October 09, 2006 09 Oct'06

    Banking on the future

    As the banking landscape changes and global competition takes hold, IT offers banks a way of differentiating themselves from the competition, so how do they balance innovation and imitation in this tough market sector?

  • September 26, 2006 26 Sep'06

    Voice over IP Fundamentals: Chapter 9, 'Billing and Mediation Services'

    Voice over IP Fundamentals: Chapter 9, 'Billing and Mediation Services'

  • September 26, 2006 26 Sep'06

    Stration worm targets Windows machines

    The worm uses several fake email messages, including one claiming to be a security update. Users are advised to avoid unsolicited email attachments.

  • September 14, 2006 14 Sep'06

    Secure network perimeter to result from Symantec-Juniper deal

    Juniper and Symantec announced a deal to integrate Symantec's client security software with Juniper's security hardware. The result will allow endpoint compliance and access control platforms to secure the enterprise perimeter.

  • September 11, 2006 11 Sep'06

    Security Bytes: Hackers target the Terminator

    In other news, Symantec upgrades its Norton product line and the Anti-Phishing Working Group says phishing activity soared this summer.

  • September 06, 2006 06 Sep'06

    Fast Guide: VoIP encryption

    A guide to encryption within VoIP networks

  • September 05, 2006 05 Sep'06

    Proofpoint delivers strong messaging security

    Proofpoint Messaging Security Gateway is a highly recommended, affordable solution for big enterprises that need protection from email-based attacks.

  • August 31, 2006 31 Aug'06

    Attacks against MS06-040 on the rise

    Six pieces of malware are now going after the Windows Server Service flaw outlined in MS06-040, and a spike in attacks has led Symantec to raise its ThreatCon to Level 2.

  • August 30, 2006 30 Aug'06

    Survey: Data breaches difficult to spot, prevent

    IT pros worry that false positives and a lack of resources are preventing them from blocking data breaches

  • August 30, 2006 30 Aug'06

    Symantec CIO vies with virtualization, device policy

    Symantec CIO David Thompson says virtualization is a big part of the security giant's future and it has developed a policy to mitigate virtualization security risks.

  • August 30, 2006 30 Aug'06

    Malware database access sparks debate

    Should an emerging database of more than 300,000 malware samples remain a walled community for trusted users, or is open access the best way to fight off digital desperados?

  • August 29, 2006 29 Aug'06

    AT&T breach affects 19,000 customers

    Online outlaws hacked into an AT&T computer system and stole credit card data on thousands of customers. AT&T has offered to pay for credit monitoring services for those affected.

  • August 27, 2006 27 Aug'06

    Third-party patching: Prudent or perilous?

    Security patches issued by third parties have become more prevalent in recent months, and while some security pros endorse them, others say they're more trouble than they're worth.

  • August 24, 2006 24 Aug'06

    Security Blog Log: Opinions abound on IBM/ISS deal

    Bloggers ponder what IBM's acquisition of ISS says about the industry as a whole. Is the end in sight for independent security vendors?

  • August 21, 2006 21 Aug'06

    Briefs: VoiceCon in the news

    This week at VoiceCon we saw everything from managed VoIP services to IP phones made to make mobile workers right at home, wherever they are.

  • August 17, 2006 17 Aug'06

    Apple fixes Xsan security flaw

    Attackers could exploit a security flaw in Apple's Xsan file system to launch malicious code and crash vulnerable machines, but a fix is available.

  • August 15, 2006 15 Aug'06

    Cisco says it can't reproduce PIX flaw

    Ever since a researcher at Black Hat outlined a flaw in the PIX firewall, Cisco has been trying to reproduce the security hole. So far, the company has been unsuccessful.

  • August 15, 2006 15 Aug'06

    Cisco boosts VoIP certification

    The upgraded CCNP midlevel Cisco certification now incorporates VoIP, security and wireless to boost converged network skills among enterprise professionals.

  • August 14, 2006 14 Aug'06

    EMC sheds light on RSA integration plans

    As the dust begins to settle on EMC's $2.1 billion acquisition of RSA Security, the hard work of integration begins. What's EMC strategy here?

  • August 14, 2006 14 Aug'06

    Mocbot update targets MS06-040 flaw

    Security experts raised the red flag Sunday as new malware targets the Windows flaw addressed in the MS06-040 patch. Attackers are using the flaw to expand IRC-controlled botnets.

CIO
Security
Networking
Data Center
Data Management
Close