News

IT security

  • January 16, 2007 16 Jan'07

    Network security threats and answers, by industry

    Michael Gregg offers network pros in various industries security advice and step-by-step solutions to help lock down the network.

  • January 15, 2007 15 Jan'07

    Core Security offers powerful testing tool

    We highly recommend Core Impact 6.0 to security engineers to verify the vulnerability of their networks.

  • January 15, 2007 15 Jan'07

    Apere's IMAG 500 a tough sell

    Product review: Apere says many of the issues we encountered are addressed in its next release, but mid-enterprise businesses may not have the tolerance for this product.

  • January 14, 2007 14 Jan'07

    Storage management software finalists

    Find out who was selected as finalists in the storage management software category for our storage products of the year

  • January 11, 2007 11 Jan'07

    Oracle emulates Microsoft with advance patch notice

    Oracle will patch 52 security flaws across its product line Tuesday, according to its inaugural CPU advance notification bulletin.

  • January 11, 2007 11 Jan'07

    Network security -- Taking the layered approach

    Network security is tricky business. In his new book Hack the Stack, author and security expert Michael Gregg outlines how to secure the network using the OSI model.

  • January 10, 2007 10 Jan'07

    Sophos acquires Endforce to add NAC

    Antivirus vendor Sophos is rounding out its email Web and desktop security software with Endforce's network access control (NAC) software.

  • January 09, 2007 09 Jan'07

    More users increase risk for Volkswagen AG

    With 1.5 million users on the network, Volkswagen AG depends more than ever on strong ID and access management to safeguard intellectual property, according to its CISO.

  • January 09, 2007 09 Jan'07

    Remote flaw in Vista could earn finder $8,000

    VeriSign Inc.'s iDefense Labs is offering an $8,000 bounty to any researcher who finds a remotely exploitable flaw in Windows Vista.

  • January 09, 2007 09 Jan'07

    Network configuration management key to VoIP success

    While companies spend millions on upgrading infrastructure for VoIP, little attention is given to solving the largest source of downtime – configuration-related outages due to human error.

  • January 08, 2007 08 Jan'07

    How far apart can SAN locations be?

    Storage locations can potentially be very far apart, separated by thousands of miles, even around the globe. The real consideration in selecting distance is that of latency...

  • January 08, 2007 08 Jan'07

    Critical fixes for Excel, Outlook and Windows

    Microsoft starts the year with security updates for Excel, Outlook and Windows. Three of the fixes are rated critical.

  • January 08, 2007 08 Jan'07

    Attackers hide malicious code using new method

    Attackers have designed a new way to thwart virus signatures from antivirus vendors, says a new report.

  • January 07, 2007 07 Jan'07

    Bug Briefs: OpenOffice vulnerable to attack

    Other flaws were reported in Apple QuickTime, Mac OS X, Adobe Flash Player, VideoLAN VLC, the Opera Web browser, and Cisco Access Control Server.

  • January 07, 2007 07 Jan'07

    Microsoft nixes four patch bulletins

    Eight security updates were originally scheduled for Patch Tuesday , but Microsoft has decided to hold back on half of them.

  • January 07, 2007 07 Jan'07

    NAC implementation slows as networking budgets grow

    Network Access Control (NAC) implementations will decrease, despite growth in networking budgets.

  • January 04, 2007 04 Jan'07

    Adobe Reader users urged to upgrade

    Adobe Reader 8 fixes serious flaws attackers could exploit for cross-site scripting and other attacks.

  • January 03, 2007 03 Jan'07

    Cisco bolsters security with IronPort buy

    Cisco Systems agreed Thursday to buy Internet gateway security vendor IronPort Systems Inc. for $830 million.

  • January 03, 2007 03 Jan'07

    Cisco software vulnerable to attack

    Cisco's Clean Access software and Clean Access Manager are at risk to attack. A malicious user can access a database snapshot and download it without authentication.

  • January 03, 2007 03 Jan'07

    Information security market 2006 year in review

    In part two of our two-part special edition of Security Wire Weekly, site editor Eric Parizo reveals his picks for top information security interviews of 2006. Audio clips in this program include Andrew Braunberg of Current Analysis; Johannes ...

  • January 02, 2007 02 Jan'07

    Security pros grumble over spam increase

    Spim and spam from unexpected sources is challenging enterprises in 2007. Some enterprises are taking action.

  • December 26, 2006 26 Dec'06

    Looking back at information security in 2006

    In this special edition of Security Wire Weekly, senior news writer Bill Brenner reviews his top interviews of 2006.

  • December 25, 2006 25 Dec'06

    Top 10 storage stories of 2006

    SAN and NAS converged and shook up the industry, iSCSI went mission-critical, users conquered tiered storage and more.

  • December 20, 2006 20 Dec'06

    Top 10 storage acquisitions of 2006

    Industry consolidation was fast and furious this year. We rank the deals by quality, not quantity.

  • December 19, 2006 19 Dec'06

    Microsoft releases Vista APIs to security vendors

    Microsoft released a draft set of programming interfaces allowing security vendors to develop software using the Windows kernel on 64-bit systems.

  • December 19, 2006 19 Dec'06

    Mozilla fixes multiple Firefox flaws

    Digital miscreants could exploit flaws in Mozilla's popular Firefox browser to bypass security programs, access sensitive information and conduct cross-site scripting attacks.

  • December 19, 2006 19 Dec'06

    Check Point gets big IDS boost from NFR deal

    Analysts say Check Point would gain much-needed intrusion detection and prevention capabilities through its acquisition of NFR Security. The deal should erase bad memories of the aborted Sourcefire deal.

  • December 18, 2006 18 Dec'06

    VoIP hacking exposed in new book

    VoIP hacking is a reality, and in a new book, two VoIP security experts outline the tools and tricks to avoid a system-crushing hack.

  • December 17, 2006 17 Dec'06

    Criminals find safety in cyberspace

    A new report from McAfee shows how criminals are enjoying a sense of safety and anonymity in cyberspace that they never had on the street. And they're making more money.

  • December 14, 2006 14 Dec'06

    Employers to seek more security talent in '07

    Learn what certifications are growing in demand and how employers are looking at the job market in 2007.

  • December 14, 2006 14 Dec'06

    Schneier: Data breach at UCLA barely newsworthy

    This week in Security Blog Log: Security luminary Bruce Schneier and others sound off on the UCLA data breach that exposed 800,000 people to identity fraud.

  • December 13, 2006 13 Dec'06

    Review: Sky's the limit with Skybox View 3.0

    Hot Pick: Skybox View 3.0 offers a unique and flexible approach for assessing and managing specific threats and overall risk to your digital assets.

  • December 13, 2006 13 Dec'06

    Hosted VoIP eliminates cost, complexity

    Hosted VoIP is being adopted at increasing rates as more and more companies look to avoid the excess costs and complexities of on-premise solutions.

  • December 13, 2006 13 Dec'06

    Third zero-day found in Microsoft Word

    For the third time in a week, a zero-day flaw has been found in Microsoft Word. Users should be cautious when opening attachments from unknown sources.

  • December 13, 2006 13 Dec'06

    Host-based replication

    While the lines of distinction among data protection technologies such as backup, continuous data protection and replication have blurred, host-based replication can play a key role in your overall data protection strategy.

  • December 12, 2006 12 Dec'06

    Expert offers tips to bolster messaging security

    In this edition of Security Wire Weekly, Burton Group analyst Diana Kelley explains how to lock down messaging programs as part of our three-day special report on the subject.

  • December 12, 2006 12 Dec'06

    Symantec issues NetBackup security alert

    Symantec issues an alert and patch to vulnerabilities in NetBackup 6.0, 5.1 and 5.0.

  • December 12, 2006 12 Dec'06

    Data breach at Boeing exposes 382,000 employees

    The third theft of a Boeing laptop in the last 13 months has exposed the data of nearly 400,000 employees and retirees.

  • December 11, 2006 11 Dec'06

    Storage Decisions Session Downloads: Executive Track (LV 2006)

    Our "Executive track" sessions give C-level technology executivesan idea of where their storage should be and ideas on where it's headed.

  • December 11, 2006 11 Dec'06

    Microsoft fixes two zero-day flaws

    The December security update from Microsoft includes patches for zero-day flaws in Visual Studio and Windows Media Player, but two zero-day flaws in Word remain unfixed.

  • December 11, 2006 11 Dec'06

    IT pros look for ways to lock down IM

    Special Report: To control growing IM threats, administrators are trying to limit which programs can be used or ban the technology altogether. But that's not always possible.

  • December 10, 2006 10 Dec'06

    Zantaz buys data classification partner Singlecast

    Email archiving player Zantaz has purchased data classification startup Singlecast, which can categorise and apply policies to data before an email takes up storage space.

  • December 10, 2006 10 Dec'06

    Messaging insecurity fuels data leakage fears

    Special Report: The proliferation of messaging technology means more opportunity for malware to take root and sensitive data to be lifted.

  • December 10, 2006 10 Dec'06

    Microsoft suffers third zero-day in a week

    A second zero-day flaw in Word has been uncovered, Microsoft said Sunday. It's the software giant's third zero-day in a week.

  • December 10, 2006 10 Dec'06

    Storage Decisions in the wild, wild west

    Dedupe, iSCSI, backup, virtualisation and cowboys in Stetson hats -- Storage Decisions Las Vegas 2006 had it all.

  • December 10, 2006 10 Dec'06

    Windows Vista security settings

    Microsoft's Windows Vista is here. Here, Current Analysis senior analyst Andrew Braunberg discusses what network admins need to know about tightening up Vista security.

  • December 07, 2006 07 Dec'06

    Dell, Microsoft tout joint NAS product

    The new NX1950 product is vastly more expensive than its counterparts from HP and NetApp, but it scales higher, supports clusters and has redundant controllers.

  • December 06, 2006 06 Dec'06

    Microsoft to fix Visual Studio, Windows flaws

    Microsoft plans to release five security updates to address vulnerabilities in Windows and a flaw in Visual Studio as part of its monthly security bulletin release cycle.

  • December 06, 2006 06 Dec'06

    Zero-day flaw found in Windows Media Player

    Attackers could exploit a new zero-day flaw in Windows Media Player to cause a denial of service or launch malicious code. The threat is Microsoft's second zero-day flaw in a week.

  • December 06, 2006 06 Dec'06

    MP3 search site pushes spyware, watchdogs say

    A Web site that gives users the ability to search for MP3s contains programs that behave like spyware, according to the Center for Democracy and Technology and StopBadware.org.