-
A new problem for Mac OS X users
A new vulnerability in Mac OS X is apparently immune to patches Apple released to fix earlier problems.28 May 2004
-
'Rugrat' can attack 64-bit systems
This virus can't cause much trouble, but it's the first to successfully target 64-bit Windows files.28 May 2004
-
Case study: L.A. health alerts don't miss a beat
Los Angeles County Department of Health Services bioterrorism IT coordinator David Cardenas fields and distributes about a dozen serious health alerts to physicians, hospitals and response agencies...27 May 2004
-
Survey: Despite dangers, IT personnel sleep well
Network security managers rely on outdated protections and place business needs and legislative mandates above attack fears, according to a new study.27 May 2004
-
Big business weighs feds involvement in software flaws
The nation's leading big business lobby said the federal government should stay out of the commercial software arena -- maybe -- and allow industry and software companies to jointly address the pro...27 May 2004
-
The best of SearchSecurity.com
Peruse our top 10 tips and top 10 news articles for the month of May.27 May 2004
-
Week 24: Identify current countermeasures and estimate likelihood of exploitation
In this week's column, Shelley Bard continues her series on how to perform risk assessments.27 May 2004
-
Adventures in wireless security: Why home and corporate wireless LANs are insecure
Security guru Ira Winkler shares his adventures in securing a home wireless LAN.26 May 2004
-
Guidelines for reporting security flaws under review
The Organization for Internet Safety wants feedback on disclosing software security holes.26 May 2004
-
Industry Notebook: Big launches from CA, HP and Microsoft; InfoExpress and Sygate release products
Major software companies unveil hardware-based vulnerability and server security solutions.26 May 2004
-
Wireless phones bigger target in next two years
As cell phones and handhelds add Web functions, they'll also become more attractive to virus writers.25 May 2004
-
Six key practices for a successful interdepartmental security committee
Best practices for implementing an interdepartmental security committee.25 May 2004
-
Episode VII - Vulnerability assessment & remediation management integration
Check out Episode VII - Vulnerability assessment & remediation management integration.24 May 2004
-
For rent, security included
Secure Internet connectivity may one day become a standard option like electricity and heat in commercial leases. At least that's the belief of Steven Vaughn, president of Texas National Bank.24 May 2004
-
Hacking for Dummies: Chapter 10 -- Wireless LANs
Learn how to keep your wireless LAN safe from hackers.24 May 2004
-
Three newcomers on worm scene worth a watch
Bobax, Kibuv and Lovgate-AB target Windows machines. None have done widespread damage yet.24 May 2004
-
Drowning in buffer-overflow vulnerabilities
Building cars with gas tanks that explode on impact wasn't a good idea, and automakers eventually phased that feature out of their products. Software vendors could learn a lesson from that mistake,...24 May 2004
-
Week 23: Risk assessment steps five and six: Identify threats and determine vulnerabilities
In this week's column, Shelley Bard continues her advice on risk assessment.20 May 2004
-
Antivirus firms rethinking automated alerts
Responding to industry criticism, some antivirus vendors are changing the way they distribute automated virus alerts, tightening the audience to include only those that request them. IT managers co...20 May 2004
-
IT experts not losing sleep over code theft
Days after Cisco acknowledged someone may have stolen source code from its network, IT experts said they doubt it will amount to anything catastrophic. After all, source code has made it onto the I...20 May 2004
Security Management Strategies for the CIO