News
IT security
-
December 04, 2006
04
Dec'06
IBM to acquire compliance software firm
IBM plans to acquire Consul Risk Management Inc., a Delft, Netherlands-based firm whose software tracks non-compliant behavior of employees.
-
December 04, 2006
04
Dec'06
Spam -- stop it at the network edge
Spam has become much more than just a nuisance; it can slow or crash the network. F5 recently added a module to its Big IP platform to stop spam at the network edge.
-
December 03, 2006
03
Dec'06
Security Bytes: Phishing worm spreads through MySpace
Round up of security news
-
November 30, 2006
30
Nov'06
Terrorists may target financial sites
The U.S. government is warning of an al-Qaida call for a cyberattack against online stock trading and banking Web sites
-
November 30, 2006
30
Nov'06
Symantec blames piracy for Veritas licensing snafu
Weekly compilation of storage news: Symantec says that software counterfeiting is throwing a wrench in tech support ; FRCP rules take effect.
-
November 30, 2006
30
Nov'06
Oracle responds to security critics
Security Blog Log: Oracle takes on researchers who have criticised its security procedures in recent weeks. Meanwhile, Symantec warns of new zombie malware.
-
November 29, 2006
29
Nov'06
Multiple flaws in Adobe Reader, Acrobat
Multiple flaws in Adobe Reader and Acrobat could allow attackers to execute malicious commands on victims' computers.
-
November 29, 2006
29
Nov'06
Podcast: Security certifications pay could rebound in '07
Security certifications pay is languishing, according to skill and certifications pay expert David Foote of Foote Research. Foote examines the state of the IT security job market.
-
November 28, 2006
28
Nov'06
Symantec fixes NetBackup Puredisk flaw
An unauthorised user could launch malicious code by exploiting a flaw in Symantec's Veritas NetBackup PureDisk product. But a fix is available.
-
November 28, 2006
28
Nov'06
Adware targets Mac OS X
As F-Secure notes what may be the first example of adware designed for Macs, researcher LMH reports more flaws in the operating system as part of the Month of Kernel Bugs.
-
November 28, 2006
28
Nov'06
Study: Some firms balk at mobile security
Companies are failing to safeguard sensitive data on employee mobile devices, according to a survey by the Business Performance Management Forum.
-
November 23, 2006
23
Nov'06
Commentary: We've never met a "thought follower"
A couple of days back, a vendor tried to convince us that their new security consultancy services should be of interest to you, our readers.
-
November 22, 2006
22
Nov'06
Zango defying FTC agreement, researchers say
This week in Security Blog Log: Two researchers accuse Zango of unsavory adware tactics, despite the company's pledge to clean up its act.
-
November 21, 2006
21
Nov'06
New Mac OS X flaw exposed
A Mac OS X flaw was exposed as part of the Month of Kernel Bugs. Also, a new Web site vows to follow the lead of researchers LMH and H.D. Moore with a week of Oracle zero-days.
-
November 21, 2006
21
Nov'06
BakBone brushes up replication software
BakBone's NetVault Replicator version 5.0 includes automatic configuration of replication for remote sites, a capacity planning tool and a higher performance data movement engine.
-
November 20, 2006
20
Nov'06
Insider security threats come in many forms
Insiders could be the greatest threat to a company's security. The best defense is to let them know Big Brother is watching and a plan to deal with troublemakers.
-
November 19, 2006
19
Nov'06
Virtualisation: friend or foe? [Day Two: The virtual appliance]
Virtualisation slashes costs, makes management easier, unshackles software configurations from hardware. And it is being embraced around the world. But is it secure? In this three-part series, Patrick Gray explores the security implications of this ...
-
November 13, 2006
13
Nov'06
Trojan poses as Adobe software update
The Trojan keylogger comes in an email that asks users to download the latest version of Adobe Reader. It then tries to steal the user's confidential information.
-
November 08, 2006
08
Nov'06
Storage virtualization acquisitions need careful consideration
Storage virtualization alleviates traditional storage growth problems by implementing a layer of abstraction between applications and physical storage, allowing storage to be combined and treated as a ubiquitous resource, regardless of location. ...
-
November 08, 2006
08
Nov'06
Microsoft to patch critical zero-day flaws in Windows
Microsoft plans to repair five critical flaws in Windows and a flaw in XML Core Services as part of its monthly patch update next week.
-
November 07, 2006
07
Nov'06
Mozilla fixes Firefox flaws
Attackers could exploit multiple flaws in Firefox, SeaMonkey and Thunderbird to crash machines, bypass security restrictions and launch malicious code.
-
November 06, 2006
06
Nov'06
How to manage encryption keys
Encryption is an effective way to secure data, but the encryption keys used must be carefully managed to ensure data remains protected and accessible when needed.
-
November 06, 2006
06
Nov'06
Agency improves security grades under CISO's watch
CISO Philip Heneghan has made security a way of life for the U.S. Agency for International Development (USAID). His work earned him a Security 7 award.
-
November 06, 2006
06
Nov'06
Sourcefire IPO could fuel Snort, users say
Snort users frowned when Check Point tried to acquire Sourcefire last year. But they are more optimistic about Sourcefire's plans to go public.
-
November 05, 2006
05
Nov'06
Microsoft eyes second zero-day threat in a week
This time, attackers are going after a zero-day flaw in Windows, and Microsoft has released some workarounds until a patch is available.
-
November 05, 2006
05
Nov'06
Mobile device encryption - a practice not often applied
Encryption is the best way to protect data on mobile devices -- but too few companies are actually deploying this critical technology.
-
November 02, 2006
02
Nov'06
Review: SPI Dynamics' WebInspect 6.1
SPI Dynamics has created a powerful tool for novices as well as advanced users who will appreciate the time and effort it saves.
-
November 01, 2006
01
Nov'06
Tor network privacy could be cracked
The Tor network is used by those who want to keep their IP addresses private. But new research shows that it's possible to compromise the system and unmask the user.
-
October 31, 2006
31
Oct'06
Flaw found in Firefox 2.0
Attackers could exploit the security flaw to crash versions 1.5.0.7 and 2.0 of the browser, according to various security advisories.
-
October 31, 2006
31
Oct'06
E-vaulting's many faces can confuse IT efforts
E-vaulting is the process that describes how enterprise IT departments ship backup tapes and replicate data to remote disk arrays and VTLs. E-vaulting is not a new concept, but more recently it has grown to mean remote backups and replication for ...
-
October 30, 2006
30
Oct'06
Messaging Security School
SearchSecurity.com's Messaging Security School has brought together some of the most knowledgeable experts in the messaging security field to offer you personal instruction on how to secure the information handled by your organization's knowledge ...
-
October 30, 2006
30
Oct'06
Countermeasures for malicious email code
Today's malware continues to raise the security stakes. Enterprises are now facing numerous evolving threats like targeted and blended attacks, zero-day exploits, botnets and phishing schemes. The attacks aren't the only things evolving; so are ...
-
October 30, 2006
30
Oct'06
Survey: Data breach costs surge
A new study by the Ponemon Institute finds a 31% increase in the costs associated with a data breach.
-
October 26, 2006
26
Oct'06
Achieving compliance: a real-world roadmap
A security manager's responsibilities extend beyond the technical aspects of the job. These days, effective governance and compliance are just as essential.
-
October 26, 2006
26
Oct'06
Security Blog Log: The never-ending PatchGuard debate
This week, security vendor fright over the Windows Vista PatchGuard feature permeates the blogosphere. Is Microsoft the boogeyman, or just misunderstood?
-
October 25, 2006
25
Oct'06
Research shows massive botnet growth
Reports from McAfee and Microsoft show bot herders are gaining ground and threatening national infrastructure. Some suppliers hope to strike back by sharing resources.
-
October 23, 2006
23
Oct'06
What storage managers are buying and why, page 7
What storage managers are buying and why
-
October 23, 2006
23
Oct'06
What storage managers are buying and why, page 6
What storage managers are buying and why
-
October 23, 2006
23
Oct'06
Security researcher, professor influences students for life
Dorothy Denning, a professor of defense analysis at the Naval Postgraduate School, has contributed to the field of data security. Her work earned her a Security 7 award.
-
October 23, 2006
23
Oct'06
SDL expected to help fulfil Vista security promises
Windows Vista is expected to be the most secure Microsoft product released thanks to the company's implementation of the Security Development Lifecycle (SDL).
-
October 22, 2006
22
Oct'06
Information Security Decisions Session Downloads
Session Downloads from Information Security Decisions 2006 Conference.
-
October 22, 2006
22
Oct'06
Enhanced Identity and Access Management
From consolidating directories to automating provisioning and rolling out single sign-on, these sessions identify how leading organizations are strengthening authorization and enforcing access controls.
-
October 22, 2006
22
Oct'06
Snyder On Security: An insider's guide to the essentials
Joel Snyder, senior partner with consultancy Opus One, provides an in-depth look at information security trends and technologies.
-
October 18, 2006
18
Oct'06
Rural Payments Agency project failed after IT system costs spiralled
Delays in implementing a bespoke IT system led to the Rural Payments Agency (RPA) failing to pay subsidies to farmers on time, according to a National Audit Office report.
-
October 16, 2006
16
Oct'06
Security Bytes: Flaws fixed in Bugzilla
Meanwhile, security holes are also plugged in Cisco's Wireless Location Appliance software and Clam AntiVirus.
-
October 15, 2006
15
Oct'06
Microsoft caves to pressure over Vista security
To accommodate third-party security vendors and appease antitrust regulators in Europe, Microsoft will make some final tweaks to Windows Vista.
-
October 12, 2006
12
Oct'06
Microsoft to fold security into Windows division
The software giant said the move would make future Windows development efforts more efficient. The changes take effect after Microsoft releases Vista.
-
October 12, 2006
12
Oct'06
What to do when your server goes down
When a server goes down at a particular time every night without the prompt of a virus, our expert, Puneet Mehta, can tell you what the problem is and what you can do to avoid it.
-
October 11, 2006
11
Oct'06
Brief: Malicious Web site poses as Google
A malicious Web site poses as Google's Italian site, but attempts to install malicious ActiveX controls on victim's machines and ultimately redirect them to adult content.
-
October 10, 2006
10
Oct'06
McAfee CEO Samenuk retires in wake of options probe
The investigation into stock option grants is complete and company president Kevin Weiss has been fired, as well.