December 2006

  • More from SearchSecurity.com -- December 2006

    Highlights from the December 2006 issue of Information Security magazine.

  • Comodo Firewall: An intelligent way to protect against application attacks

    Looking for a solid firewall replacement? Contributing editor, Scott Sidel, recommends Comodo Firewall, an open source tool that can prevent application attacks.

  • Looking back at information security in 2006

    In this special edition of Security Wire Weekly, senior news writer Bill Brenner reviews his top interviews of 2006. Highlights include Oracle's Darius Wiles, SPI Dynamic's Billy Hoffman, Dan Geer,...

  • Which wireless security assessment tools are commercially available?

    Most auditors use open source tools to perform wireless assessments. There are other commerical options, though, as network security expert Mike Chapple explains in this SearchSecurity.com Q&A.

  • How should a desktop firewall policy manage open ports?

    Having a standard desktop firewall policy is an important security measure. In this expert Q&A, network security pro Mike Chapple reviews where to begin when enacting these restrictions.

  • Should log traffic be encrypted?

    Should you be encrypting your security log transmissions? "It depends!" explains Mike Chapple in this SearchSecurity.com expert Q&A.

  • What enterprise tools can scan files for sensitive data?

    Given the many recent high-profile data breaches, organizations seem keen on securing their sensitive data, including credit card and social security numbers. In this expert Q&A, SearchSecurity.com...

  • Microsoft investigates Windows Vista flaw

    Local users could gain elevated system privileges and run malicious commands by exploiting an error within the Windows server library. Vista is among the OS versions affected.

  • Skype Trojan: Much ado about nothing?

    This week in Security Blog Log: A Trojan horse has captured headlines by targeting Skype users. But some believe the threat is being blown out of proportion.

  • Using steganography for securing data, not concealing it

    Steganography is a useful technique for securely storing sensitive data, but the difficulty in detecting its usage can create an opportunity for digital miscreants. Michael Cobb explains how to ens...

  • Websense acquiring PortAuthority Technologies

    Meanwhile: Sony BMG settles lawsuit over rootkit technology; Apple fixes a Mac OS X glitch; and Microsoft releases the first draft of PatchGuard APIs.

  • Mozilla issues fixes for Firefox, SeaMonkey and Thunderbird

    Digital miscreants could exploit flaws in Mozilla's popular Firefox browser to bypass security programs, access sensitive information and conduct cross-site scripting attacks.

  • Microsoft releases Vista APIs to security vendors

    Microsoft released a draft set of programming interfaces allowing security vendors to develop software using the Windows kernel on 64-bit systems.

  • Check Point gets big IDS boost from NFR deal

    Analysts say Check Point would gain much-needed intrusion detection and prevention capabilities through its acquisition of NFR Security. The deal should erase bad memories of the aborted Sourcefire...

  • Who should manage the firewall?

    Maintaining a firewall is not an easy task, especially when business rules narrowly define which tasks should be performed by network administrators and which should be handled by information secur...

  • Welcome to SearchSecurity.com

    SearchSecurity.com, the Web's best security-specific information resource for enterprise IT professionals, offers you access to all types of security training resources in one convenient location. ...

  • Report: Spam, phishing attacks growing more sophisticated

    Security researchers at MessageLabs and Symantec are reporting a significant rise in more sophisticated botnet and phishing attacks, putting a stranglehold on corporate communications.

  • Database compliance demystified

    As security professionals grapple with both federal mandates and industry-specific guidance, many wonder how best to approach these issues in terms of data protection and security. In this tip, Jam...

  • Check Point to acquire NFR Security

    In other news: New flaws affect Microsoft, McAfee and Yahoo Messenger, while Trend Micro discovers a so-called Vista zero-day flaw on sale for $50,000 a sample.

  • Criminals find safety in cyberspace

    A new report from McAfee shows how criminals are enjoying a sense of safety and anonymity in cyberspace that they never had on the street. And they're making more money.