February 2006

  • Cisco fixes TACACS+ authentication vulnerabilities

    Cisco Systems announced the availability of free software to fix TACACS+ authentication vulnerabilities, which could allow a malicious user to bypass security in affected systems.

  • Keylogger basics

    Keystroke loggers are a serious threat to security. In this tip by contributor Tony Bradley, learn how they work and what you can do to avoid them.

  • Companies still not reporting attacks, FBI director says

    At a BSA Town Hall Meeting, Robert Mueller urged companies to cooperate with law enforcement if its ever to gain ground on cybercriminals.

  • Cisco unveils steps toward self-defending network

    In his keynote, CEO John Chambers touted product enhancements that advance his push for networks that can defend themselves without human intervention.

  • threat modeling

    Threat modeling is a procedure for optimizing network security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent, or mitigate the effects of, threats to th...

  • Gates to open RSA with Microsoft's security vision

    As Microsoft Chairman Bill Gates prepares to offer his company's 2006 security plans, users explain why they're finally starting to trust the software giant.

  • Exceptional exhibitors earn Impact Awards

    Cybertrust takes Best in Show at the RSA Security Conference for its promotional plan. Three others received honors in the second annual event.

  • RSA 2006: Product announcements

  • CEOs share vision of safer cyberspace

    RSA's Art Coviello and Sun Microsystems' Scott McNealy offer suggestions for strengthening security and privacy and the public's faith in both.

  • Microsoft 'hearts' security pros with 'Patch Tuesday' updates

    Microsoft's monthly security bulletins include 2 critically ranked flaws, one for Internet Explorer.

  • Crypto panel takes on RFID, bashed hash functions

    The lively exchange between some of security's biggest names in the business this year included a wake-up call to update older designs and devise a new hash function standard as well as watch out f...

  • Application development best practices

    Michael Cobb, SearchSecurity.com's application security expert, discusses best practices for specific application development procedures in this Ask the Expert Q&A.

  • RSA CEO: Federation has been a disappointment

    In the 10 years since Art Coviello took over as CEO of RSA Security, the company's revenues have swelled to $305 million for fiscal 2004, and the RSA Conference has grown into the information secur...

  • Gates calls for the end of passwords

    Microsoft's chairman outlined a future where code is written more securely and passwords are no more. Can his company get us there?

  • ILOVEYOU virus

    The ILOVEYOU virus comes in an e-mail note with "I LOVE YOU" in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Mi...

  • Securing Web logins

    In this identity and access management Ask the Expert Q&A, our expert outlines best practices and techniques for securing Web logins.

  • How to transition from a UNIX environment to the security management field

    Learn how to transition to a career in security management, if you were once a UNIX specialist and whether it would be wise to opt for a vendor specific or a vendor neutral certification during thi...

  • IBM issues fixes for flaws in Lotus Notes 6.5.4 and 7.0

    IBM Corp. announced fixes for six "highly critical" security flaws that could allow arbitrary code execution in Lotus Notes versions 6.5.4 and 7.0.

  • Microsoft AntiSpyware Beta incorrectly identifies AV software

    A recent signature file for the beta version of Microsoft Windows AntiSpyware incorrectly identifies a registry key of Symantec antivirus software. Removing the identified registry key disables ant...

  • Smart tactics for antivirus and antispyware

    AV has become a commodity service with vendors touting value-added features and the ability to protect other parts of the network. This video addresses AV and antispyware from an architectural pers...