December 2006 | Archive by Month |

December 2006

  • More from -- December 2006

    Highlights from the December 2006 issue of Information Security magazine.

  • Comodo Firewall: An intelligent way to protect against application attacks

    Looking for a solid firewall replacement? Contributing editor, Scott Sidel, recommends Comodo Firewall, an open source tool that can prevent application attacks.

  • Looking back at information security in 2006

    In this special edition of Security Wire Weekly, senior news writer Bill Brenner reviews his top interviews of 2006. Highlights include Oracle's Darius Wiles, SPI Dynamic's Billy Hoffman, Dan Geer,...

  • How should a desktop firewall policy manage open ports?

    Having a standard desktop firewall policy is an important security measure. In this expert Q&A, network security pro Mike Chapple reviews where to begin when enacting these restrictions.

  • Skype Trojan: Much ado about nothing?

    This week in Security Blog Log: A Trojan horse has captured headlines by targeting Skype users. But some believe the threat is being blown out of proportion.

  • Which wireless security assessment tools are commercially available?

    Most auditors use open source tools to perform wireless assessments. There are other commerical options, though, as network security expert Mike Chapple explains in this Q&A.

  • Microsoft investigates Windows Vista flaw

    Local users could gain elevated system privileges and run malicious commands by exploiting an error within the Windows server library. Vista is among the OS versions affected.

  • What enterprise tools can scan files for sensitive data?

    Given the many recent high-profile data breaches, organizations seem keen on securing their sensitive data, including credit card and social security numbers. In this expert Q&A,

  • Should log traffic be encrypted?

    Should you be encrypting your security log transmissions? "It depends!" explains Mike Chapple in this expert Q&A.

  • Using steganography for securing data, not concealing it

    Steganography is a useful technique for securely storing sensitive data, but the difficulty in detecting its usage can create an opportunity for digital miscreants. Michael Cobb explains how to ens...

  • Websense acquiring PortAuthority Technologies

    Meanwhile: Sony BMG settles lawsuit over rootkit technology; Apple fixes a Mac OS X glitch; and Microsoft releases the first draft of PatchGuard APIs.

  • Microsoft releases Vista APIs to security vendors

    Microsoft released a draft set of programming interfaces allowing security vendors to develop software using the Windows kernel on 64-bit systems.

  • Mozilla issues fixes for Firefox, SeaMonkey and Thunderbird

    Digital miscreants could exploit flaws in Mozilla's popular Firefox browser to bypass security programs, access sensitive information and conduct cross-site scripting attacks.

  • Check Point gets big IDS boost from NFR deal

    Analysts say Check Point would gain much-needed intrusion detection and prevention capabilities through its acquisition of NFR Security. The deal should erase bad memories of the aborted Sourcefire...

  • Who should manage the firewall?

    Maintaining a firewall is not an easy task, especially when business rules narrowly define which tasks should be performed by network administrators and which should be handled by information secur...

  • Report: Spam, phishing attacks growing more sophisticated

    Security researchers at MessageLabs and Symantec are reporting a significant rise in more sophisticated botnet and phishing attacks, putting a stranglehold on corporate communications.

  • Welcome to, the Web's best security-specific information resource for enterprise IT professionals, offers you access to all types of security training resources in one convenient location. ...

  • How will HSPD-12 affect authentication?

    HSPD-12, signed in 2004, has called for standardized access to government facilities. In this expert Q&A, Joel Dubin reviews the mandate and states how it could impact today's authentication methods.

  • Database compliance demystified

    As security professionals grapple with both federal mandates and industry-specific guidance, many wonder how best to approach these issues in terms of data protection and security. In this tip, Jam...

  • Criminals find safety in cyberspace

    A new report from McAfee shows how criminals are enjoying a sense of safety and anonymity in cyberspace that they never had on the street. And they're making more money.