News

IT strategy

  • March 22, 2007 22 Mar'07

    Flaws haunt protocol tied to national infrastructure

    Also: A weakness is found in Windows settings, Microsoft investigates a new Vista flaw, and flaws are addressed in OpenOffice.org and Firefox.

  • March 22, 2007 22 Mar'07

    Mozilla releases Firefox fix

    One newly-discovered flaw and several glitches introduced in the last update have been fixed with Mozilla's release of Firefox 2.0.0.3 and 1.5.0.11.

  • March 22, 2007 22 Mar'07

    Midrange storage array specifications

    Product snapshots highlighting key specifications for a cross section of midrange storage array products.

  • March 21, 2007 21 Mar'07

    Storage Security FAQ audiocast

    Don't have time to dig into the FAQ text now? Download the audiocast in MP3 format and listen in the car, at the gym -- wherever you want. You can download the entire presentation or the individual questions that you are most interested in.

  • March 21, 2007 21 Mar'07

    Hackers broaden reach of cross-site scripting attacks

    An explosion of AJAX-based applications has increased the damage that cross-site scripting (XSS) attacks can inflict on machines. A new tool uses XSS flaws to create a botnet.

  • March 20, 2007 20 Mar'07

    NAC panel says technology may not add up

    A panel discussing the potential of using network access control (NAC) says the technology may not be worth the price of deploying and maintaining it.

  • March 19, 2007 19 Mar'07

    Internet complexity, insecurity could stifle innovation, expert says

    Security threats are driving vendors to produce software and devices that automatically update and run only proprietary software with no effort from the end user. The result could be less flexibility and innovation, one expert says.

  • March 18, 2007 18 Mar'07

    Symantec: Data thieves thrive on zero-day flaws

    According to Symantec's threat report for the second half of 2006, attackers exploited misplaced USB drives and zero-day flaws to steal vast amounts of data. Expect more of the same in 2007.

  • March 18, 2007 18 Mar'07

    Hacker techniques use Google to unearth sensitive data

    Those who know where to look could use Google to dig up all sorts of sensitive company information, including intellectual property and passwords, one security expert warns.

  • March 18, 2007 18 Mar'07

    Cisco stamps on Brocade in Q4, Dell'Oro says

    For the second quarter in a row Cisco is gaining SAN switch market share on Brocade, according to the latest report by the Dell'Oro Group. But the numbers are causing a firestorm.

  • March 15, 2007 15 Mar'07

    Cisco buys WebEx for $3.2 billion

    Cisco plans to buy WebEx, maker of hosted, on-demand collaboration applications.

  • March 13, 2007 13 Mar'07

    NEC reveals HydraStor grid storage

    NEC announces its HydraStor array for secondary storage, touting its grid storage architecture, automated policies for data management and scalable deduplication.

  • March 13, 2007 13 Mar'07

    What are some best practices for retaining data in a highly regulated business environment?

    Have a good information retention policy. I see a lot of organizations where they retain backups or copies of databases, but they don't know why they're retaining it or for how long...

  • March 08, 2007 08 Mar'07

    Review: eGuardPost a B+ overall

    eGuardPost is a well-designed and highly capable product that meets an important need. It has strong security and great forensics capabilities.

  • March 08, 2007 08 Mar'07

    Review: Sun Java System Identity Manager 7.0 'impressive'

    Hot Pick: Sun Java System Identity Manager 7.0 excels with agentless connectors, scalability and amazing auditing.

  • March 07, 2007 07 Mar'07

    Symantec acquires automated risk assessment firm

    Symantec has acquired Reston, Va.-based 4FrontSecurity, a maker of automated risk analysis and security management tools. An expert says it's the latest sign that the security risk assessment market is heating up.

  • March 04, 2007 04 Mar'07

    Buzz builds around data reduction for primary storage

    Analysts predict that in-band compression offerings from StoreWiz, newly updated this week, are the first step toward a new wave of primary storage deduplication products.

  • March 04, 2007 04 Mar'07

    Expert: NAC not a network security cure-all

    According to an expert at Black Hat DC, NAC success demands careful planning and a good understanding of the company network; otherwise, implementations can quickly go awry.

  • March 02, 2007 02 Mar'07

    Police force secures data with biometrics

    Humberside Police has issued biometric USB drives among staff to maintain data security.

  • March 01, 2007 01 Mar'07

    Linksys, Gateway launch low-end NAS

    Cisco subsidiary Linksys and PC maker Gateway launch new NAS products for small businesses and consumers.

  • February 28, 2007 28 Feb'07

    RFID cloning presentation moves forward despite legal threats

    Chris Paget, director of research and development at IOActive spoke mainly about the science behind RFID tags and readers and the inherent security issues of the technology.

  • February 27, 2007 27 Feb'07

    McAfee fixes flaw in Mac antivirus software

    Attackers could exploit the hole in McAfee's Virex 7.7 antivirus program for Mac OS X to bypass the malware scanner, but a fix is available.

  • February 27, 2007 27 Feb'07

    'Worm' targets Sun Solaris Telnet flaw

    Security researchers have found evidence that a worm is trying to exploit the recently patched Telnet flaw in Sun Solaris. Experts say it's another reason to stay away from Telnet.

  • February 27, 2007 27 Feb'07

    Wireless security: IT pros warily watching mobile phone threats

    Security experts have warned repeatedly that mobile phone attacks will grow as the devices become more sophisticated. IT administrators are starting to believe them.

  • February 27, 2007 27 Feb'07

    Black Hat presenter nixes RFID cloning demo under pressure

    A demonstration of a device that could easily clone radio frequency identification (RFID) badges, was pulled from a conference presentation under pressure from a chip maker.

  • February 26, 2007 26 Feb'07

    Sun scraps 6920 array, offloads support to HDS

    The long-rumored deal that Sun will sell its 6920 virtualization array to HDS is done. But rather than developing the product, HDS will upgrade users to its TagmaStore instead.

  • February 26, 2007 26 Feb'07

    Storm rages again: Self-morphing Trojan uses blogs to spread rootkits

    A new variant of the Storm Trojan that changes with each download is infecting blog sites with malicious URLs, intercepting traffic when visitors try to post comments.

  • February 25, 2007 25 Feb'07

    Storage switch startup burns out, turns to security

    The company formerly known as Maxxan has been rechristened CipherMax and is now marketing a storage switch/encryption appliance with one point of management.

  • February 25, 2007 25 Feb'07

    HP announces iSCSI VTL for SMBs

    HP's new iSCSI VTL devices include automated backup capabilities for users with fewer than four servers.

  • February 25, 2007 25 Feb'07

    PatchLink acquires STAT Guardian tool

    PatchLink says it will add more muscle to its vulnerability management portfolio by acquiring the STAT Guardian tool from IT vendor Harris Corp.

  • February 22, 2007 22 Feb'07

    Google offers 10 GB inbox

    The search engine giant is offering an email application on a subscription basis with five times the storage capacity of the free version.

  • February 21, 2007 21 Feb'07

    Cisco warns of IP phone flaws

    Attackers could circumvent security restrictions by exploiting flaws in certain Cisco IP phones, the networking giant warned Wednesday.

  • February 20, 2007 20 Feb'07

    Cisco routers threatened by drive-by pharming

    Millions of Cisco routers in circulation could be compromised by a newly-discovered attack technique Symantec calls drive-by pharming, the networking giant warned in an advisory.

  • February 20, 2007 20 Feb'07

    Microsoft confirms new IE flaw

    Attackers could exploit a new flaw in Internet Explorer (IE) to access local files on targeted systems, Microsoft confirmed Tuesday.

  • February 20, 2007 20 Feb'07

    TJX data breach worse than initially feared

    Hackers had access to a larger amount of customer data, TJX executives said in a statement.

  • February 19, 2007 19 Feb'07

    Sourcefire fixes Snort flaw

    Attackers could exploit a flaw in the popular open source Snort IDS tool to cause a denial of service or launch malicious code.

  • February 19, 2007 19 Feb'07

    When security firms merge, some users are losers

    Some users see their services improve when IT security vendors merge with other companies or get acquired. Others say they've been left out in the cold.

  • February 19, 2007 19 Feb'07

    Quiz: Compliance improvement -- Get better as you go forward

    A five-question multiple-choice quiz to test your understanding of the content presented by expert Richard Mackey in this lesson of SearchSecurity.com's Compliance School.

  • February 14, 2007 14 Feb'07

    VoIP complexities stall implementation for SMBs

    VoIP sales in the SMB market are predicted to lead revenue in the next several years, but most SMBs are confused by the number of different solutions.

  • February 14, 2007 14 Feb'07

    New attack technique threatens broadband users

    Millions of broadband users across the globe are threatened by a new attack technique called drive-by pharming