-
Bagle strikes again
A new variant of the Bagle worm is gaining traction in the wild this afternoon, with more than 11,000 interceptions identified within the first few hours of its spread.31 Aug 2004
-
Report: Financial institutions face growing insider threat
A government study finds financial organizations are increasingly threatened by insiders who exploit their computer access to commit theft or sabotage.31 Aug 2004
-
Security Bytes: Winamp, Samba flaws fixed; man wanted for hiring DDoS attackers
In addition to Winamp, vulnerabilities are addressed in Linux, Debian and Samba. Authorities search for businessman believed behind DDoS attacks last year.31 Aug 2004
-
Oracle releases first security update in new monthly cycle
Oracle Corp. released fixes Tuesday for multiple security holes in Enterprise Manager, Database Server and Application Server.31 Aug 2004
-
Security vendor directory to aid responsible disclosure
The Open Source Vulnerability Database publishes a free security vendor directory to serve as a centralized resource for vendor contact information.31 Aug 2004
-
UPDATED: Vulnerabilities in MIT Kerberos 5
Cisco's VPN 3000 Series Concentrators are affected by vulnerabilities in MIT's Kerberos 5 authentication tool.31 Aug 2004
-
Case study: Inflow mandates integration for security products
Inflow focuses on high-level concerns, including asset management and solution integration, to protect its nearly 1,000 customers.30 Aug 2004
-
How secure are you?
A bias-free security testing methodology can help your organization move beyond general best-security practices, to discern exactly how many systems are actually protected.30 Aug 2004
-
Testing if systems have been infiltrated
27 Aug 2004
-
Be prepared: How to prevent and detect botnets
Sooner or later, enterprises have to deal with a remote-controlled compromise. By treating botnets as a disaster preparedness problem, they'll be on the right track.27 Aug 2004
-
Security Bytes: Leaks in Linux kernel
Online banks targeted by Trojan; Zone Labs and Cisco report flaws; antispyware law lays off service providers; 'Operation Web Snare' snags 150; startup sues India for stolen source code.27 Aug 2004
-
Week 36: Ports -- Don't have an 'open house' sign out
In this week's column, Shelley offers advice on securing ports.26 Aug 2004
-
Microsoft: Reports of SP2 flaws 'misguided'
Microsoft Corp. said recent reports of flaws in SP2 are "misguided" and have caused users "undue concern."26 Aug 2004
-
Multiple vulnerabilities in Cisco server
Multiple vulnerabilities in Cisco's Secure Access Control Server and Access Control Server Solution Engine can be exploited.26 Aug 2004
-
Oracle users: Monthly patch cycle prudent
Despite reservations some Windows users have with Microsoft's monthly patching cycle, experts believe a similar schedule makes sense for Oracle.26 Aug 2004
-
Zero-day exploit targets Winamp
Millions of Winamp users are vulnerable to a zero-day exploit that could install spyware and Trojans on unsuspecting victims who click on a Web site link.26 Aug 2004
-
Security warranties look out for the little guys
Use of service-level agreements rises as enterprises realize growing legal and regulatory risks in an increasingly complex global economy. But their emergence also raises questions about the legali...26 Aug 2004
-
Repurposing FUD
Your organization is exponentially more likely to suffer regular losses due to completely preventable computer problems than to be hit by cyberattacks25 Aug 2004
-
Vulnerabilities affect multiple Symantec products
A vulnerability in multiple Symantec products could be exploited for a denial-of-service attack.25 Aug 2004
-
Serious flaw affects Sun and Netscape products
Financial institutions will likely be the target of a flaw in the Netscape Network Security Services (NSS) library suite that could allow remote compromise.25 Aug 2004
Security Management Strategies for the CIO