News

IT security

  • September 25, 2007 25 Sep'07

    How to purchase a data encryption product

    Data security is now a critical problem for every company, regardless of size. This buying guide explores the factors involved in purchasing data encryption hardware and software products.

  • September 25, 2007 25 Sep'07

    ITIL v3 Service Operation: FAQs on Book 4

    ITIL expert David Pultorak answers common questions about the new ITIL Service Strategy Core Practice Book 1.

  • September 24, 2007 24 Sep'07

    PCI council adds Pin security to remit

    The PCI Security Standards Council has added Pin Entry Device (PED) security technology to its payments industry testing portfolio to streamline standardisation.

  • September 16, 2007 16 Sep'07

    Communications-as-a-service taking hold

    Communications-as-a-service is taking hold worldwide as a viable hosted IP telephony system.

  • September 05, 2007 05 Sep'07

    NAC switches, appliances help track users, malware

    Some vendors are offering switches and appliances to monitor traffic for malware and unauthorized access, as the NAC market including Cisco NAC and Microsoft NAP sorts itself out.

  • September 05, 2007 05 Sep'07

    Firefox security issues persist despite update

    Despite Mozilla's recent Firefox security update, researchers say there's another way attackers could exploit the browser for malicious purposes.

  • September 02, 2007 02 Sep'07

    Now the dust has settled on pornography filtering...

    Andrew Collins looks at the controversial topic of Internet porn filtering in Australia, now that the federal government has enacted its hotly debated plans.

  • August 30, 2007 30 Aug'07

    Network access control vendors: Attraction vs. retention

    Network access control (NAC) vendors were evaluated based on attractiveness and customer retention in a recent survey by Current Analysis.

  • August 29, 2007 29 Aug'07

    Rootkit found in older Sony USB device

    F-Secure says it discovered rootkit technology in Sony's Micro Vault USM-F fingerprint reader software. The find comes two years after controversy over Sony's DRM technology.

  • August 28, 2007 28 Aug'07

    Unified communications slow to change U.S. work culture

    Unified communications implementation is still high, but many enterprises have yet to allow users all its advantages.

  • August 28, 2007 28 Aug'07

    Data archives overview

    When a file is lost due to user error, or data is corrupted because of system problems, the affected data can be restored from a backup. An archive is different from a backup because the data may not be used for months, even years, but must be ...

  • August 28, 2007 28 Aug'07

    SANS: Attackers may be attempting Trend Micro exploits

    The SANS Internet Storm Center (ISC) warns that attackers may be attempting to exploit flaws in Trend Micro products to hijack computer systems.

  • August 23, 2007 23 Aug'07

    Nokia Intellisync boosts device management

    Nokia Intellisync has released updates to its Mobile Suite to enhance remote device support, loss and theft protection, and management capabilities.

  • August 22, 2007 22 Aug'07

    Trend Micro fixes flaws in ServerProtect, PC-cillin

    Attackers could tamper with servers and run malicious code by exploiting flaws in Trend Micro's ServerProtect, Anti-Spyware and PC-cillin products. But fixes are available.

  • August 22, 2007 22 Aug'07

    Microsoft adds CA vets to anti-malware team

    Microsoft has hired Jakub Kaminski, one of CA's more talented and well-regarded antivirus researchers, and three of his colleagues from CA's Australian lab.

  • August 22, 2007 22 Aug'07

    Attackers target two Microsoft security flaws

    Symantec warned customers about attacks targeting two Microsoft security flaws -- an unpatched DirectX Media vulnerability and the XML Core Services flaw patched in MS07-042.

  • August 21, 2007 21 Aug'07

    Nigel Phair, author of 'Cybercrime: The Reality of the Threat', on Australia's response

    In the first instalment of a three part interview, TechTarget Australia's Patrick Gray interviews Australian Federal Police Agent Nigel Phair about his new book: Cybercrime: The Reality of the Threat. Until recently, Phair was the Team Leader of ...

  • August 20, 2007 20 Aug'07

    Sourcefire acquires open source ClamAV

    Sourcefire, maker of the popular Snort open source IDS tool, has acquired ClamAV, an open source email gateway scanning tool.

  • August 20, 2007 20 Aug'07

    VMware acquires HIPS provider Determina

    VMware, the leader in virtualization software, has acquired Determina, a provider of host IPS technology.

  • August 19, 2007 19 Aug'07

    College campuses prepare for Microsoft Vista challenges

    With new Vista machines coming to campus, the IT shops of academia have no choice but to embrace the latest Windows OS and its security implications.

  • August 17, 2007 17 Aug'07

    Wal-Mart deploys new data security system

    Wal-Mart Stores has deployed a data security and encryption system to secure data going over its global network.

  • August 16, 2007 16 Aug'07

    TJX profit takes hit over data breach

    TJX says it has spent $256 million responding to the massive data breach that exposed 45 million customers to identity fraud, and the bottom line has suffered as a result.

  • August 15, 2007 15 Aug'07

    Latest Microsoft flaws affect Windows, IE, Excel

    Microsoft released nine security updates Tuesday -- six of them critical -- for flaws in Internet Explorer, Excel and other programs within the Windows OS.

  • August 14, 2007 14 Aug'07

    Novell to acquire Senforce for endpoint security

    Novell is acquiring Senforce, an early network access control supplier, to integrate its endpoint security features and develop an endpoint management suite.

  • August 14, 2007 14 Aug'07

    Apple iPhone to provoke complex mobile attacks, expert warns

    Mikko Hypponen, director of antivirus research at F-Secure, said he expects mobile malware attacks to escalate thanks to interest in Apple's iPhone.

  • August 14, 2007 14 Aug'07

    Telstra network build spurs new security plan

    Telstra's experience constructing the Next G and Next IP networks has seen the telco evolve a new security strategy.

  • August 13, 2007 13 Aug'07

    VoIP vulnerability threatens data

    VoIP vulnerabilities have now reached a level of sophistication that allows hackers to steal, view or delete data.

  • August 13, 2007 13 Aug'07

    Gartner security summit outlines 'Security 3.0'

    Gartner has opened its Sydney Security Summit with a definition of Security 3.0.

  • August 09, 2007 09 Aug'07

    NAS appliance purchase considerations

    NAS appliances are frequently touted for bringing convenience and simplicity to network storage. Appliances include their own dedicated disks for storage and RAID, and most NAS appliances can be upgraded with more or larger disks for additional ...

  • August 09, 2007 09 Aug'07

    Sun adds virtual tape library to Thumper

    Analysts say the combo of FalconStor's software, Solaris and Thumper is a good sign of integration from Sun after a disorganised year, but it's unclear if users will be convinced.

  • August 09, 2007 09 Aug'07

    Cisco warns of critical IOS flaws

    Attackers could exploit multiple flaws in Cisco's IOS to cause a denial of service or remotely execute arbitrary code.

  • August 09, 2007 09 Aug'07

    VeriSign employee data exposed in laptop theft

    Current and former employees of VeriSign were exposed to potential data fraud when a laptop housing their information was stolen from the car of a former employee.

  • August 09, 2007 09 Aug'07

    VoIP vulnerability threatens data

    VoIP vulnerabilities have now reached a level of sophistication that allows hackers to steal, view or delete data.

  • August 09, 2007 09 Aug'07

    Immunity releases new exploit-writing tool

    Pen testing company says its Debugger tool offers researchers a new way to write exploits, analyse malware and reverse engineer binary files.

  • August 08, 2007 08 Aug'07

    NAS appliance specifications

    NAS appliances are noted for their convenience, offering dedicated internal storage that is relatively straightforward to identify and manage. The biggest issue for NAS appliances is avoiding network bottlenecks and supporting expansion without ...

  • August 08, 2007 08 Aug'07

    Cisco warns of critical IOS flaws

    Attackers could exploit multiple flaws in Cisco's IOS to cause a denial of service or remotely execute arbitrary code.

  • August 08, 2007 08 Aug'07

    Wi-Fi simplicity edging out Wi-Fi security

    Experts say the standards are available to lock down Wi-Fi, but many network and security managers are taking an easier approach.

  • August 08, 2007 08 Aug'07

    EMC's RSA to acquire Tablus for data loss prevention

    RSA, the security division of EMC Corp., said it planned to acquire Tablus, a maker of sensitive data scanning and classification tools and data protection software.

  • August 07, 2007 07 Aug'07

    Subpar security compromises compliance

    Pressure to keep trading applications available has nudged security to the back of the development line.

  • August 06, 2007 06 Aug'07

    Researchers wrangle petabytes of data storage with NAS, tape

    Scientists at Cern's LHC say dozens of petabytes require custom-built NAS systems and data migration software, but commercial tape drives are mostly up to snuff.

  • August 03, 2007 03 Aug'07

    Discovery of malware cesspool triggers attack fears

    Trend Micro researchers say a malware-infested Web server in Russia, linked to several Italian Web sites, could lead to a large-scale attack.

  • August 02, 2007 02 Aug'07

    Apple releases fixes for Mac OS X, iPhone vulnerabilities

    Apple Computer has released software patches fixing critical vulnerabilities in Mac OS X and its newly released iPhone.

  • August 01, 2007 01 Aug'07

    Users make iSCSI Sans with USB keys

    Users say that Open-E's iSCSI San software, which is delivered on a USB stick, is more affordable than prepackaged systems and has more support than free iSCSI target products.

  • August 01, 2007 01 Aug'07

    Black Hat 2007: Researchers highlight new database attack method

    At this week's hacker confab, expert penetration testers will demonstrate how cyberthieves can reach into corporate databases -- without exploiting a specific software flaw -- to steal credit card and Social Security numbers.