March 2006 | Archive by Month | SearchSecurity.com | Page 3

March 2006

  • Lesson 4 quiz: I'll be watching you

    Find out how much you learned in Lesson 4 of Wireless Security Lunchtime Learning.

  • Lesson 4 Quiz Answers

  • Security Bytes: Phishing attacks get personal

    In other news: VeriSign warns of new DOS attacks; Norton update disrupts AOL connections; Oracle claims a security milestone; and researchers say viruses could infect RFID tags.

  • Phishers sink to new depths of deception

    Evolving techniques and tactics are making it easier than ever to get hooked by phishing.

  • Jelly Belly sweetens remote access

    Candy-maker Jelly Belly's network was so secure even top executives couldn't get in through the VPN. The company solved the sticky situation with innovative new appliances.

  • Opinion: Ignoring data breaches means ignoring risk management

    Corporate data breaches, leaks and losses have become commonplace, despite the recent onslaught of privacy compliance mandates and disclosure laws. While the consequences may not seem severe, corpo...

  • Spear phishing: Don't be a target

    Hackers are beginning to use targeted attacks to exploit network vulnerabilities. In this tip, Al Berg introduces a specific targeted attack, spear phishing, and provides tactics information secur...

  • Finding security's next 'American Idol'

    At Georgia Tech, students are strutting their security stuff for a panel of judges who decide whether their projects make security easy enough to earn a $50k "contract."

  • Checklist: Ten dos and don'ts for secure coding

    Download this checklist of dos and don'ts for developing secure code.

  • Adobe fixes critical Macromedia flaws

    Flash, Shockwave and other multimedia products could leave systems vulnerable to attack via a malicious Shockwave Flash object file. The vendor recommends users update immediately.

  • Companies fear dark corners of the virtual world

    According to a recent IBM survey, enterprises are now more concerned about threats in cyberspace than about those in the physical world.

  • Blocking online music access

    While letting employees listen to music online may seem like a harmless way to boost morale, streaming audio drains network bandwidth. In this tip, your peers offer advice, tools and tactics you ca...

  • Pair of Microsoft patches fixes seven flaws

    The software giant addresses six critical security holes in Microsoft Office and an "important" vulnerability in Windows. Attackers could exploit them to hijack workstations and run malicious code.

  • New freeware takes some mystery out of rogue files

    Endpoint security provider Bit9 today unveils a free search engine that tells users a file's origin, thus helping reduce unwanted software on desktops, laptops and servers.

  • brain fingerprinting

    Brain fingerprinting is a controversial technique that is advocated as a way to identify a terrorist or other dangerous person by measuring the "brainprint" of that person when shown a particular b...

  • Security Blog Log: A DRM threat to lives and infrastructure?

    A security luminary bristles at copyright groups' efforts to block exemptions to DRM programs; Citibank suffers a compromise; and experts offer tips to thwart ID thieves.

  • Public security slip forces Georgia Capitol to lock down WLAN

    More than three years after a TV news crew exposed security flaws in the WLAN at the Georgia State Capitol building, the governor's office is trying again to go wireless.

  • Microsoft to patch flaws in Windows, Office

    The software giant said the Office update on tap for Tuesday will be "critical," while the Windows fix will be rated "important."

  • Ten dos and don'ts for secure coding

    Security practitioners should understand how developers introduce security vulnerabilities into applications and work to support the developers in improving code quality and security. Encouragement...

  • Federal budget for 2007 to boost cybersecurity

    The president's budget proposal would boost spending to key cybersecurity programs, but some say firms working to improve national infrastructure security need to get their fair share.