-
Security Bytes: Blaster writer gets 18 months in prison
Also in the news, a Russian firm warns of SP2 holes in data protection feature and Gartner questions Microsoft's latest antipiracy move.31 Jan 2005
-
New Sober variant in the wild
Several antivirus firms report that a new form of the worm has hit e-mail streams. The bad English might help give it away.31 Jan 2005
-
Improving network security: How to avoid physical security threats
In this part of our Hacker Tactics and Techniques tutorial learn how to improve network security and prevent physical security threats.31 Jan 2005
-
You can prevent buffer-overflow attacks
Home-grown apps are susceptible to buffer overflows as are Windows and Linux apps; the conclusion of this two-part series will detail how to protect applications from attack.31 Jan 2005
-
Buffer-overflow attacks: How do they work?
Home-grown apps are susceptible to buffer overflows as are Windows and Linux apps; part one of this two-part series shows how hackers can take control of your programs.31 Jan 2005
-
Earnings Season Report: Rolling in revenue, but for how long?
Security firms reported strong revenue for last quarter. But with Microsoft offering more security tools, analysts warn against overconfidence.31 Jan 2005
-
How permanent is your storage solution?
Electronic files, retained to comply with regulations or for other business reasons, are vulnerable to viruses and changing media formats. What should you do?30 Jan 2005
-
New malcode targets MySQL
Forbot-DY exploits two Windows flaws, targets MySQL and attempts to create zombie PCs.28 Jan 2005
-
DoD security clearance: What defense employers are looking for
Who has the best shot at high-paying jobs requiring security clearances?27 Jan 2005
-
New Bagle variants spreading
New variants of the prolific Bagle worm prompt several antivirus firms to issue alerts.27 Jan 2005
-
Honeypots can strengthen reconnaissance and lower intrusion noise
Ira discusses the value, feasibility and ethical/liability issues employing honeypots.26 Jan 2005
-
Is your e-mail server ripe for harvesting?
New security survey reveals directory theft remains corporate America's "silent killer" and a spammer's greatest heist.26 Jan 2005
-
Guide to infosec certifications
26 Jan 2005
-
Security Bytes: Mydoom marks one year anniversary
Apple fixes OS X flaws; new Trojan goes after Lineage game fans.26 Jan 2005
-
Integrating interdepartmental security strategies
In this tip, Mike Chapple explains the four-stage process to building a coherent interdepartmental information security strategy.25 Jan 2005
-
Using free network intrusion detection and prevention tools to stop hacks
As a part of our Hacker Techniques and Tactics tutorial, learn how you can use intrusion and prevention tools to prevent hack attacks.24 Jan 2005
-
Extroverts more likely to open virus laden e-mail attachments
New studies show that socially active employees should be targeted for user awareness campaigns.24 Jan 2005
-
Cyberstorm chasers: The folks who look out for the latest Internet threats
They keep a 'round-the-clock watch on conditions in cyberspace. CTO Johannes Ullrich discusses the volunteer effort behind the SANS Internet Storm Center.24 Jan 2005
-
Security hole in Cisco IOS
A vulnerability in Cisco's Internetwork Operating Software (IOS) could be exploited for a denial-of-service attack.21 Jan 2005
-
Beware of your hotspot's 'evil twin'
IT managers are increasingly worried about hackers preying on remote employees using simulated hot spots, one expert says.21 Jan 2005
Security Management Strategies for the CIO