News

IT security

  • January 25, 2007 25 Jan'07

    IBM tool makes online purchases anonymous

    A new tool makes online purchases anonymous by using artificial identity information. Experts say enterprises need to adopt the technology before it can become a viable option.

  • January 25, 2007 25 Jan'07

    Symantec makes major update to Enterprise Vault

    Symantec adds automated data classification and integration with security products in Version 7.0 of its Enterprise Vault archiving tool; EMC reports record earnings for the fourth quarter.

  • January 25, 2007 25 Jan'07

    Apple fixes Mac Wi-Fi flaw

    The Mac OS X Wi-Fi flaw Apple fixed on 24 Jan was first disclosed as part of the Month of Kernel Bugs in November. Attackers could exploit it to crash the targeted system.

  • January 24, 2007 24 Jan'07

    Microsoft investigates new Word zero-day

    An unpatched memory-corruption flaw in Microsoft Word is the target of "limited" attacks in the wild, Microsoft confirmed Thursday.

  • January 24, 2007 24 Jan'07

    TJX data breach info used to make fraudulent purchases

    Fraudulent purchases have been reported globally, according to a trade association that represents more than 200 banks in Massachusetts.

  • January 23, 2007 23 Jan'07

    Cisco fixes IOS flaws

    Attackers could exploit three Cisco IOS flaws to cause a denial of service or launch malicious code. The networking giant has released fixes.

  • January 23, 2007 23 Jan'07

    McAfee: Malware all about ID theft

    The use of keylogger technology is surging and there's been a 100-fold rise in phishing attacks, according to a new report from McAfee.

  • January 18, 2007 18 Jan'07

    ID theft victim to TJX customers: Mind your data

    Customers should guard their own data, says one ID theft victim. Meanwhile, some in the banking industry say TJX may have stored more data than necessary.

  • January 17, 2007 17 Jan'07

    Data breach at TJX could affect millions

    Retailer TJX Companies said a hacker gained access to its systems exposing the credit card data of millions of customers.

  • January 17, 2007 17 Jan'07

    Companies take IM threats seriously

    Wesabe is a brand new money management community. It takes threats to IM as seriously as those targeting email and web applications

  • January 17, 2007 17 Jan'07

    Did TJX take the right steps after data breach?

    Security experts are mixed on whether TJX acted properly following a massive data breach last month. One expert says potential victims should have been notified sooner.

  • January 16, 2007 16 Jan'07

    Fortify Software to acquire Secure Software

    The acquisition of Secure Software will allow Fortify to expand into the requirements and design phases of the software development lifecycle, the company said.

  • January 16, 2007 16 Jan'07

    Network security threats and answers, by industry

    Michael Gregg offers network pros in various industries security advice and step-by-step solutions to help lock down the network.

  • January 15, 2007 15 Jan'07

    Core Security offers powerful testing tool

    We highly recommend Core Impact 6.0 to security engineers to verify the vulnerability of their networks.

  • January 15, 2007 15 Jan'07

    Apere's IMAG 500 a tough sell

    Product review: Apere says many of the issues we encountered are addressed in its next release, but mid-enterprise businesses may not have the tolerance for this product.

  • January 14, 2007 14 Jan'07

    Storage management software finalists

    Find out who was selected as finalists in the storage management software category for our storage products of the year

  • January 11, 2007 11 Jan'07

    Oracle emulates Microsoft with advance patch notice

    Oracle will patch 52 security flaws across its product line Tuesday, according to its inaugural CPU advance notification bulletin.

  • January 11, 2007 11 Jan'07

    Network security -- Taking the layered approach

    Network security is tricky business. In his new book Hack the Stack, author and security expert Michael Gregg outlines how to secure the network using the OSI model.

  • January 10, 2007 10 Jan'07

    Sophos acquires Endforce to add NAC

    Antivirus vendor Sophos is rounding out its email Web and desktop security software with Endforce's network access control (NAC) software.

  • January 09, 2007 09 Jan'07

    More users increase risk for Volkswagen AG

    With 1.5 million users on the network, Volkswagen AG depends more than ever on strong ID and access management to safeguard intellectual property, according to its CISO.

  • January 09, 2007 09 Jan'07

    Remote flaw in Vista could earn finder $8,000

    VeriSign Inc.'s iDefense Labs is offering an $8,000 bounty to any researcher who finds a remotely exploitable flaw in Windows Vista.

  • January 09, 2007 09 Jan'07

    Network configuration management key to VoIP success

    While companies spend millions on upgrading infrastructure for VoIP, little attention is given to solving the largest source of downtime – configuration-related outages due to human error.

  • January 08, 2007 08 Jan'07

    How far apart can SAN locations be?

    Storage locations can potentially be very far apart, separated by thousands of miles, even around the globe. The real consideration in selecting distance is that of latency...

  • January 08, 2007 08 Jan'07

    Critical fixes for Excel, Outlook and Windows

    Microsoft starts the year with security updates for Excel, Outlook and Windows. Three of the fixes are rated critical.

  • January 08, 2007 08 Jan'07

    Attackers hide malicious code using new method

    Attackers have designed a new way to thwart virus signatures from antivirus vendors, says a new report.

  • January 07, 2007 07 Jan'07

    Bug Briefs: OpenOffice vulnerable to attack

    Other flaws were reported in Apple QuickTime, Mac OS X, Adobe Flash Player, VideoLAN VLC, the Opera Web browser, and Cisco Access Control Server.

  • January 07, 2007 07 Jan'07

    Microsoft nixes four patch bulletins

    Eight security updates were originally scheduled for Patch Tuesday , but Microsoft has decided to hold back on half of them.

  • January 07, 2007 07 Jan'07

    NAC implementation slows as networking budgets grow

    Network Access Control (NAC) implementations will decrease, despite growth in networking budgets.

  • January 04, 2007 04 Jan'07

    Adobe Reader users urged to upgrade

    Adobe Reader 8 fixes serious flaws attackers could exploit for cross-site scripting and other attacks.

  • January 03, 2007 03 Jan'07

    Cisco bolsters security with IronPort buy

    Cisco Systems agreed Thursday to buy Internet gateway security vendor IronPort Systems Inc. for $830 million.

  • January 03, 2007 03 Jan'07

    Cisco software vulnerable to attack

    Cisco's Clean Access software and Clean Access Manager are at risk to attack. A malicious user can access a database snapshot and download it without authentication.

  • January 03, 2007 03 Jan'07

    Information security market 2006 year in review

    In part two of our two-part special edition of Security Wire Weekly, site editor Eric Parizo reveals his picks for top information security interviews of 2006. Audio clips in this program include Andrew Braunberg of Current Analysis; Johannes ...

  • January 02, 2007 02 Jan'07

    Security pros grumble over spam increase

    Spim and spam from unexpected sources is challenging enterprises in 2007. Some enterprises are taking action.

  • December 26, 2006 26 Dec'06

    Looking back at information security in 2006

    In this special edition of Security Wire Weekly, senior news writer Bill Brenner reviews his top interviews of 2006.

  • December 25, 2006 25 Dec'06

    Top 10 storage stories of 2006

    SAN and NAS converged and shook up the industry, iSCSI went mission-critical, users conquered tiered storage and more.

  • December 20, 2006 20 Dec'06

    Top 10 storage acquisitions of 2006

    Industry consolidation was fast and furious this year. We rank the deals by quality, not quantity.

  • December 19, 2006 19 Dec'06

    Microsoft releases Vista APIs to security vendors

    Microsoft released a draft set of programming interfaces allowing security vendors to develop software using the Windows kernel on 64-bit systems.

  • December 19, 2006 19 Dec'06

    Mozilla fixes multiple Firefox flaws

    Digital miscreants could exploit flaws in Mozilla's popular Firefox browser to bypass security programs, access sensitive information and conduct cross-site scripting attacks.

  • December 19, 2006 19 Dec'06

    Check Point gets big IDS boost from NFR deal

    Analysts say Check Point would gain much-needed intrusion detection and prevention capabilities through its acquisition of NFR Security. The deal should erase bad memories of the aborted Sourcefire deal.

  • December 18, 2006 18 Dec'06

    VoIP hacking exposed in new book

    VoIP hacking is a reality, and in a new book, two VoIP security experts outline the tools and tricks to avoid a system-crushing hack.

  • December 17, 2006 17 Dec'06

    Criminals find safety in cyberspace

    A new report from McAfee shows how criminals are enjoying a sense of safety and anonymity in cyberspace that they never had on the street. And they're making more money.

  • December 14, 2006 14 Dec'06

    Employers to seek more security talent in '07

    Learn what certifications are growing in demand and how employers are looking at the job market in 2007.

  • December 14, 2006 14 Dec'06

    Schneier: Data breach at UCLA barely newsworthy

    This week in Security Blog Log: Security luminary Bruce Schneier and others sound off on the UCLA data breach that exposed 800,000 people to identity fraud.

  • December 13, 2006 13 Dec'06

    Review: Sky's the limit with Skybox View 3.0

    Hot Pick: Skybox View 3.0 offers a unique and flexible approach for assessing and managing specific threats and overall risk to your digital assets.

  • December 13, 2006 13 Dec'06

    Hosted VoIP eliminates cost, complexity

    Hosted VoIP is being adopted at increasing rates as more and more companies look to avoid the excess costs and complexities of on-premise solutions.

  • December 13, 2006 13 Dec'06

    Third zero-day found in Microsoft Word

    For the third time in a week, a zero-day flaw has been found in Microsoft Word. Users should be cautious when opening attachments from unknown sources.