-
Fake BBC e-mails seek to exploit IE flaw
Attackers are using messages with BBC article excerpts to trick people into visiting a Web site that exploits the Internet Explorer createTextRange flaw.31 Mar 2006
-
More from SearchSecurity -- April 2006
Highlights from this month's issue of Information Security magazine.31 Mar 2006
-
Security Blog Log: Nash, still at helm, addresses IE fixes
With big updates in store for Internet Explorer, outgoing security chief Mike Nash uses Microsoft's security blog to address concerns.30 Mar 2006
-
Grid computing and security uncertainties
Sun Microsystems made a splash last week by announcing the first generally available commercial grid computing service. However, it was quickly brought to its knees by a DDOS attack; it proved to b...30 Mar 2006
-
Fidelity laptop snafu spotlights need for security policies
The theft last week of a Fidelity-owned laptop containing sensitive data could have easily been prevented. Are your users paying attention when it comes to laptop security?30 Mar 2006
-
Security Bytes: Courts get tough on digital miscreants
This week a Wi-Fi thief and a spyware duo face the music; Web analysts distance themselves from the bad guys; and does anyone want to go on a 'phishing' trip?29 Mar 2006
-
Compliance guide for managers: Lessons learned and best decisions
Compliance guide for managers: Lessons learned and best decisions29 Mar 2006
-
Data integrity authentication schemes.
In this Ask the Expert Q&A, Joel Dubin, our identity and access mangement expert examines various data integrity authentication schemes.29 Mar 2006
-
Getting from here to there: WPA2 migration
WEP has been cracked, WPA is a band-aid, and your CSO recommends upgrading to WPA2. Great, but that's just not going to happen overnight. How do you migrate your installed base of legacy equipment?...28 Mar 2006
-
Windows Vista doubles Group Policy's potential
The next version of Windows doubles the number of Group Policy settings from roughly 1,500 to about 3,000. Most of them are security related.28 Mar 2006
-
Fresh Bagels offer baked-in rootkits
The prolific worm's latest variants now sport rootkit functionality; one AV firm says most malware may soon include rootkits because attackers won't be able to resist the ROI.28 Mar 2006
-
Report: Looking for love in all the wrong places
Data shows people are using company resources to find mates, shop, gamble and chat with friends while on the clock. Is it time for enterprises to confront the new way of doing business?28 Mar 2006
-
Designing a DMZ using iptables
In this tip, excerpted from ITKnowledge Exchange, security practitioners share strategies used to design a demilitarized zone using iptables.28 Mar 2006
-
Third-party fixes available for IE flaw
The unofficial work-arounds for the createTextRange flaw suggest the security community doesn't like waiting for Microsoft to address potentially dangerous vulnerabilities.28 Mar 2006
-
Microsoft shakeup: Nash is out
Microsoft made another sweeping reorganization last week. Among the changes? Mike Nash, corporate vice president of the security technology unit, is stepping aside.28 Mar 2006
-
Become compliant – without breaking the bank, part 2
Re-use your existing tools to meet regulatory demands.27 Mar 2006
-
Become compliant -- without breaking the bank
Re-use your existing tools to meet regulatory demands.27 Mar 2006
-
Security Bytes: E-mail marketers smacked with lawsuits, fines
Also in the news, a company in hot water for improper outsourcing; cheap spyware kits for sale; and Protegrity buys a small file-level security vendor.27 Mar 2006
-
Security Blog Log: Clues point to bot 'sleeper cells'
This week, security bloggers see signs of a massive bot attack in the works, while Sunbelt Software warns of a Russian Web site selling eBay accounts.24 Mar 2006
-
Lake Forest Hospital's Rx for HIPAA compliance
In this case study, learn how merging networks helped one medical facility with HIPAA compliance requirements.24 Mar 2006
Security Management Strategies for the CIO