-
Home users threaten enterprises
Home users' lack of security knowledge is threatening enterprise and government networks, according to a new survey.29 Oct 2004
-
Security Chapter Downloads & Book Giveaway
Every month we will highlight chapter downloads and give away a free book!29 Oct 2004
-
VoIP security, 'spit' concern experts
A rise in enterprises using VoIP technology has highlighted security and spam concerns.28 Oct 2004
-
Zafi-C targets Google, Microsoft and Hungarian leader
Each new strain of the Zafi worm is more sophisticated and malicious than the last, according to one antivirus expert.28 Oct 2004
-
Threat management: Assessing patch rankings
Experts warn security managers not to take patch rankings at face value.28 Oct 2004
-
Week 45: Firewall security tips
When your organization's networks are connected to the Internet without adequate security measures, you are vulnerable to attack.28 Oct 2004
-
'Highly critical' flaw in RealPlayer, RealOne
An attacker could use a buffer overflow vulnerability in RealPlayer and RealOne Player to launch malicious code, but a fix is available.27 Oct 2004
-
Regulating information security
Ira discusses the benefits of regulating information security.27 Oct 2004
-
The missing cybersecurity debate
IT practitioners say President George W. Bush and Sen. John F. Kerry have been unclear about their cybersecurity plans.27 Oct 2004
-
Understanding the 'hole' truth
Small and medium-sized businesses, especially those that team with big players, are leaving everyone vulnerable to attacks when flaws go unnoticed. There are some steps that SMBs can take to find t...26 Oct 2004
-
Security Bytes: New worm variants plague e-mail; flaws found in Linux, Solaris
Famus-B uses Iraq war to spread, while Myflip claims to be from eBay. IBM announced new security index.26 Oct 2004
-
Use performance evaluations to strengthen your infosec staff
When resources are low you can't afford to carry dead weight. Use these evaluation best practices to keep your team lean and mean.26 Oct 2004
-
How does the removal of WinPcap library impact malicious use of scanning software?
25 Oct 2004
-
Security Bytes: Google battens its hatch
Google fixes flaw in it's Desktop Search tool; multiple vendors announce flaws; Cisco acquires Perfigo.25 Oct 2004
-
Red Hat patch update a malicious hoax
Red Hat warned users to beware of bogus e-mails pretending to be an alert from its security team.25 Oct 2004
-
Online fraud 101
Financial institutions concerned about online fraud and phishing can benefit from a crash course in Check 21 risk mitigation techniques and a few other pointers.25 Oct 2004
-
Virus targets Mac OS X users
Security experts say the Opener virus should serve as a warning that non-Microsoft users' machines aren't attack-proof.25 Oct 2004
-
Check 21 becomes law
Implementation of the Check Clearing for the 21st Century Act begins Thursday and could open the door to mass consumer fraud.25 Oct 2004
-
Check 21: A classic case of risk
Risk is all about trade-offs, in this case cost-effectiveness versus security.25 Oct 2004
-
Spamming the universe
Already feel like you're drowning in a sea of spam? Experts predict it will only get worse, more than doubling by 2007.22 Oct 2004
Security Management Strategies for the CIO