-
More from SearchSecurity.com -- November 2006
Highlights from November edition of Information Security magazine30 Nov 2006
-
Multiple flaws in Adobe Reader, Acrobat
Updated: Multiple flaws in Adobe Reader and Acrobat could allow attackers to execute malicious commands on victims' computers. A fix is now available.30 Nov 2006
-
Which Internet protocol is more secure: FTPS or SCP?
In this expert Q&A, Michael Cobb reviews the strengths and weaknesses of various Internet protocols. Learn the pros and cons of FTPS, SCP and SFTP.30 Nov 2006
-
Podcast: Security certifications pay could rebound in '07
Security certifications pay is languishing, according to skill and certifications pay expert David Foote of Foote Research. Foote examines the state of the IT security job market.30 Nov 2006
-
Report: Microsoft beats Oracle on security
In a new whitepaper, security guru David Litchfield of Next Generation Security explains why Microsoft has a tighter grasp on its database defenses than Oracle.30 Nov 2006
-
Oracle should heed critical report touting SQL Server security
A prominent security researcher sheds light on Oracle's security lapses, but how will the vendor respond? As Executive Editor Dennis Fisher explains, Oracle should look internally.30 Nov 2006
-
Symantec fixes NetBackup Puredisk flaw
An unauthorized user could launch malicious code by exploiting a flaw in Symantec's Veritas NetBackup PureDisk product. But a fix is available.29 Nov 2006
-
Apple fixes 22 Mac OS X flaws
The patches include a fix for a Wi-Fi flaw reported earlier this month as part of the Month of Kernel Bugs. A number of other flaws remain unfixed, however.29 Nov 2006
-
Effective wireless security is available, but holes exist
Specialist vendors offer products that allow even small businesses to run a secure wireless network without paying a high price, but that doesn't mean companies are using it.29 Nov 2006
-
How to survive mobile phone attacks
While much of the information security world has remained focused on threats against PCs and Wi-Fi-enabled laptops, Mikko Hypponen has focused increasingly on potential attacks targeting mobile pho...29 Nov 2006
-
RFID security issues endanger companies and consumers
As the holiday season approaches, credit card purchases will undoubtedly increase. However, before waving your RFID-enabled credit card at the checkout of your favorite store, research suggests you...28 Nov 2006
-
Study: Some firms balk at mobile security
Companies are failing to safeguard sensitive data on employee mobile devices, according to a survey by the Business Performance Management Forum.28 Nov 2006
-
Adware targets Mac OS X
As F-Secure notes what may be the first example of adware designed for Macs, researcher LMH reports more flaws in the operating system as part of the Month of Kernel Bugs.28 Nov 2006
-
Developing an information security program using SABSA, ISO 17799
In this final article of our information security governance series, Shon Harris explains how to develop an information security program with SABSA and ISO 17799.22 Nov 2006
-
Zango defying FTC agreement, researchers say
This week in Security Blog Log: Two researchers accuse Zango of unsavory adware tactics, despite the company's pledge to clean up its act.22 Nov 2006
-
Firefox, IE flaw could expose passwords
A flaw in Firefox 2.0 and IE could affect anyone visiting a Web site that allows user-contributed HTML codes to be added, according to Chapin Information Services.22 Nov 2006
-
Insider security threats come in many forms
Insiders could be the greatest threat to a company's security. The best defense is to let them know Big Brother is watching and a plan to deal with troublemakers.21 Nov 2006
-
New Mac OS X flaw exposed
A Mac OS X flaw was exposed as part of the Month of Kernel Bugs. Also, a new Web site vows to follow the lead of researchers LMH and H.D. Moore with a week of Oracle zero-days.21 Nov 2006
-
Inside MSRC: Microsoft details security tool update
Microsoft's Christopher Budd explains how to use the new versions of the Security Baseline Analyzer and the Systems Management Server Inventory Tool for Microsoft Updates.20 Nov 2006
-
SpamThru Trojan behind junk mail surge
A new report from SecureWorks outlines how a Russian spam group used the SpamThru Trojan to engineer a tidal wave of unwanted email traffic.17 Nov 2006
Security Management Strategies for the CIO