News

IT security

  • May 17, 2007 17 May'07

    VoIP security fundamentals

    VoIP security is a challenge for IT staff because IP telephony brings with it not only the security problems of data networks but also new threats specific to VoIP. In this fundamentals guide, learn about network security threats and emerging IP ...

  • May 16, 2007 16 May'07

    Screencast: How to configure a UTM device

    In this exclusive screencast, expert David Strom demonstrates the configuration options available in SonicWall's unified threat management product.

  • May 16, 2007 16 May'07

    When signature based antivirus isn't enough

    Zero-day exploits, targeted attacks and increasing demands for endpoint application controls are driving the rapid metamorphosis from signature-based antivirus and antispyware to HIPS-based integrated products.

  • May 11, 2007 11 May'07

    Cisco fixes fresh flaws in IOS

    Attackers could exploit two flaws in Cisco's IOS to cause a denial of service or tamper with data in a device file system.

  • May 09, 2007 09 May'07

    Symantec fixes flaws in Norton, pcAnywhere

    Attackers could exploit flaws in Symantec's Norton AntiVirus and pcAnywhere to launch malicious code or compromise a user's session credentials.

  • May 08, 2007 08 May'07

    Companies plug FTP holes with secure FTP servers

    Some companies are investing in secure FTP suites to give employees and business partners the ability to transfer large files such as large documents, audio, video and photos.

  • May 03, 2007 03 May'07

    Quiz: Preventing data leaks

    A six-question multiple-choice quiz to test your understanding of the content presented by expert Richard Bejtlich in this lesson of SearchSecurity.com's Data Protection Security School.

  • May 03, 2007 03 May'07

    Quiz: Enterprise strategies for protecting data at rest

    A five-question multiple-choice quiz to test your understanding of the e-discovery content presented by expert Perry Carpenter in this lesson of SearchSecurity.com's Data Protection Security School.

  • May 03, 2007 03 May'07

    Quiz: Demystifying data encryption

    A five-question multiple-choice quiz to test your understanding of the data encryption content presented by expert Tom Bowers in this lesson of SearchSecurity.com's Data Protection Security School.

  • May 03, 2007 03 May'07

    Microsoft users sticking with third-party security vendors

    IT pros are pleased with Microsoft's security advances, including those found in Forefront. But don't expect them to drop their third-party security vendors.

  • May 02, 2007 02 May'07

    Microsoft to release DNS patch Tuesday

    In addition to a fix for the DNS Server Service flaw, Microsoft plans to patch critical flaws in Windows, Office, Exchange, CAPICOM and BizTalk.

  • May 01, 2007 01 May'07

    IM slang glossary

  • April 26, 2007 26 Apr'07

    New image spam sneaks into inboxes

    Researchers at Secure Computing Corp. have discovered a new form of image spam that is sneaking into corporate systems and clogging inboxes.

  • April 26, 2007 26 Apr'07

    Websense to acquire SurfControl

    Websense says its planned $400 million acquisition of SurfControl will allow it to better compete in the global security market.

  • April 24, 2007 24 Apr'07

    Scaling storage networks demands careful consideration

    In the Fibre Channel world, scaling often means adding more and faster switch ports to extend the fabric's bandwidth and connectivity. But IP storage (mainly iSCSI) is a growing area of SAN expansion, using ubiquitous Ethernet network technology to ...

  • April 24, 2007 24 Apr'07

    Apple fixes 25 Mac OS X flaws

    Attackers could exploit about two dozen flaws in Mac OS X to cause a denial of service, bypass security restrictions, disclose sensitive data and run malicious code.

  • April 23, 2007 23 Apr'07

    Weekly compilation of storage news:Dell LTO-4 drive, new Sun array

    Dell is first out of the gate with the new LTO-4 drive, which offers native encryption; Sun unveils new array and deepens its relationship with FalconStor.

  • April 20, 2007 20 Apr'07

    Disaster Recovery Planning Podcasts

    DR expert Jon Toigo explains how the new realities of business make DR planning an essential element of daily IT process, procedure, product development and procurement.

  • April 17, 2007 17 Apr'07

    SNW: Users wary of outsourcing backup

    Symantec unveiled plans for outsourced, online data backup services this week, but users at Storage Networking World are more cautious than ever about letting go of their data.

  • April 17, 2007 17 Apr'07

    Storage consolidation: Disks and disk subsystems overview

    Any storage consolidation effort must involve a serious consideration of disk subsystems and the specific disk types that those systems will contain

  • April 16, 2007 16 Apr'07

    DNS worm strikes at Microsoft flaw

    A new worm called Rinbot.BC exploits the Microsoft DNS flaw by installing an IRC bot on infected machines and scanning for other vulnerable servers.

  • April 15, 2007 15 Apr'07

    Malware outbreak 'largest in almost a year'

    Security firm Postini and the SANS Internet Storm Center said they are tracking a significant malware outbreak. Postini calls it the biggest email attack in almost a year.

  • April 12, 2007 12 Apr'07

    Microsoft investigates DNS server flaw

    Attackers could exploit a DNS flaw in Microsoft Windows 2000 Server and Windows Server 2003 and run malicious code on the system. A workaround is suggested until a patch is issued.

  • April 12, 2007 12 Apr'07

    Microsoft DNS server flaw called dangerous

    UPDATE: Microsoft said Sunday that attacks are still limited, but a proof of concept code to exploit the vulnerability is publicly available.

  • April 11, 2007 11 Apr'07

    Instant messaging threats become more sophisticated

    Instant messaging faces greater threats as more enterprises begin to utilize it, making it a more appealing target to hackers.

  • April 11, 2007 11 Apr'07

    Architectural firm swaps online data backup service providers

    As online data backup services take off, one early adopter slashed costs dramatically by switching to a newer service on the market.

  • April 10, 2007 10 Apr'07

    Capacity planning software specifications

    Gauging storage needs over time is one of the biggest challenges faced by IT administrators, and a new generation of capacity planning tools is emerging to help forecast growth and utilisation of storage resources.

  • April 10, 2007 10 Apr'07

    The changing threat of email attacks

    In this Messaging Security School lesson, expert Mike Rothman details the state of next-generation email threats, explores reputation systems and uncovers threats AV can't catch.

  • April 08, 2007 08 Apr'07

    How data deduplication eases storage requirements

    Storage administrators are struggling to handle spiraling volumes of documents, audio, video, images and large email attachments. Adding storage is not always the best solution, and many companies are turning to data reduction technologies such as ...

  • April 08, 2007 08 Apr'07

    Spam campaign uses Storm-like attack technique

    Spammers used an attack technique much like last January's "Storm" assault to dupe people into downloading malware over the weekend. This time, they used fake WWIII headlines.

  • April 08, 2007 08 Apr'07

    Symantec fixes 'high-risk' flaw in Enterprise Security Manager

    Attackers could hijack machines from remote locations by exploiting a flaw in Symantec Enterprise Security Manager (ESM). Kaspersky Lab users also have a flaw to deal with.

  • April 04, 2007 04 Apr'07

    Data security breach at UCSF may have exposed thousands

    The University of California at San Francisco (UCSF) acknowledged Wednesday that a security hole in a computer server may have exposed 46,000 people to potential identity fraud.

  • April 01, 2007 01 Apr'07

    Microsoft releases patch for Windows ANI flaw

    Security companies are seeing massive attacks against the Windows ANI zero-day flaw, prompting Microsoft to rush out a fix a week before Patch Tuesday.

  • March 26, 2007 26 Mar'07

    What are some of the best practices for managing the growth of unstructured data?

    It starts with corporate policies around data management...

  • March 26, 2007 26 Mar'07

    Web 2.0: CIOs want it their way

    A new study found CIOs want Web 2.0 technology, but they're a little insecure about getting it from emerging specialized vendors.

  • March 26, 2007 26 Mar'07

    Metasploit Framework 3.0 released

    Brief: Metasploit Framework 3.0 contains 177 exploits, 104 payloads, 17 encoders and 30 auxiliary modules that perform such tasks as host discovery and protocol fuzzing.

  • March 26, 2007 26 Mar'07

    How can a company set retention policies with such a glut of unstructured data?

    It depends; there are no easy answers to this. There are a number of initiatives that a company should undertake, including disaster recovery, business continuity planning, Sarbanes-Oxley compliance and data security...

  • March 26, 2007 26 Mar'07

    Are there regulatory compliance issues related to unstructured data?

    The most important issue is legal discovery. You may not know what you have or how to find it, so it can be very difficult to find the files that may be required by a court of law...

  • March 25, 2007 25 Mar'07

    Microsoft investigates Windows Vista Mail flaw

    Attackers could exploit a flaw in Windows Vista Mail to compromise PCs by tricking the user into opening a malicious email attachment. Microsoft is investigating.

  • March 22, 2007 22 Mar'07

    Flaws haunt protocol tied to national infrastructure

    Also: A weakness is found in Windows settings, Microsoft investigates a new Vista flaw, and flaws are addressed in OpenOffice.org and Firefox.

  • March 22, 2007 22 Mar'07

    Mozilla releases Firefox fix

    One newly-discovered flaw and several glitches introduced in the last update have been fixed with Mozilla's release of Firefox 2.0.0.3 and 1.5.0.11.

  • March 22, 2007 22 Mar'07

    Midrange storage array specifications

    Product snapshots highlighting key specifications for a cross section of midrange storage array products.

  • March 21, 2007 21 Mar'07

    Hackers broaden reach of cross-site scripting attacks

    An explosion of AJAX-based applications has increased the damage that cross-site scripting (XSS) attacks can inflict on machines. A new tool uses XSS flaws to create a botnet.

  • March 20, 2007 20 Mar'07

    NAC panel says technology may not add up

    A panel discussing the potential of using network access control (NAC) says the technology may not be worth the price of deploying and maintaining it.

  • March 19, 2007 19 Mar'07

    Internet complexity, insecurity could stifle innovation, expert says

    Security threats are driving vendors to produce software and devices that automatically update and run only proprietary software with no effort from the end user. The result could be less flexibility and innovation, one expert says.

  • March 18, 2007 18 Mar'07

    Symantec: Data thieves thrive on zero-day flaws

    According to Symantec's threat report for the second half of 2006, attackers exploited misplaced USB drives and zero-day flaws to steal vast amounts of data. Expect more of the same in 2007.