-
Hijacked DNS servers could allow an Internet assault
Roger Thompson, chief technology officer of New Kingstown, Penn.-based Exploit Prevention Labs, has had a long career in the security business. In 1987, he co-founded the first Australian antivirus...31 Oct 2007
-
Symantec, McAfee address security flaws
Security flaws in Symantec Altiris Deployment Solution and McAfee E-Business Server could be exploited to cause a denial of service or run malicious files. Fixes are available.31 Oct 2007
-
Symantec adds intruder identification to database security software
Symantec entered the database security market last year and is now introducing intruder identification and tighter integration with its security suite.30 Oct 2007
-
Cybersecurity commission to set security recommendations for next administration
The Commission on Cyber Security for the 44th President, to be announced Tuesday, will look for ways to improve cybersecurity under the next presidential administration.29 Oct 2007
-
Researchers flag Symantec Mail Security flaws
Vulnerability researchers warn of multiple flaws in Symantec Mail Security for SMTP, Exchange and Domino. Attackers could exploit them to compromise targeted machines.29 Oct 2007
-
Can confidential data be accessed once it is deleted for free space?
Depending on how full a drive is, confidential data can survive indefinitely -- whether it is deleted or not. In this expert response, Michael Cobb explains whether the files live and how they can ...29 Oct 2007
-
Screencast: Snort -- Tactics for basic network analysis
In this exclusive screencast step-by-step demo, Tom Bowers explains how the Snort open source IDS tool works and illustrates how it can help security pros assess network security.29 Oct 2007
-
How to test an e-commerce Web site's security and privacy defenses
Assessing the security of e-commerce sites means checking up on their associated servers, databases and applications. In this expert response, Michael Cobb explains where to start.26 Oct 2007
-
Should confidential data be indexed or used as the index key?
A recent attack uses a series of insert operations to find weaknesses in the database's indexing algorithm. Michael Cobb explains the nature of the threat and what it means for customer data.26 Oct 2007
-
Enterprise data management: Analyzing business processes and infrastructure for data protection
Before deciding on a data protection plan, security professionals need to answer two big questions: where is the data, and how is it handled? In this tip from SearchSecurity.com's Data Protection S...26 Oct 2007
-
RealNetworks issues advisory for more critical flaws
In less than a week, RealNetworks Inc. widened the scope of its advisory to include all previous versions of its popular media players.26 Oct 2007
-
Why does Skype connect to so many servers?
Skype is a peer-to-peer service that uses a distributed network of "supernodes" to facilitate communication throughout the world. But is it safe to have so many "volunteer" connections? Mike Chapp...25 Oct 2007
-
Is it possible to identify a fake wireless access point?
A network's identity is easy to fake. If you're looking for proof of a valid access point, Mike Chapple reveals some secure wireless options.25 Oct 2007
-
Is a 'self-defending network' possible?
Is there a product available that can be plugged into your network and allow you to rest easy? Mike Chapple explains what vendors may be suggesting when they tout a 'self-defending' network.25 Oct 2007
-
Traditional single sign-on (SSO) products versus federated identities
Identity management and access control expert Joel Dubin discusses the pros and cons of single sign-on products and federated identities.25 Oct 2007
-
Using fingerprint door locks in a network environment
Identity management and access control expert Joel Dubin discusses fingerprint door lock technology, and unveils whether or not they can be controlled through a network.25 Oct 2007
-
Server considerations for internal network application setup
Looking to offer private applications to users on an internal network? In this expert response, Mike Chapple explains why you shouldn't use the same server that provides public applications.25 Oct 2007
-
Should Apple iPhones automatically connect to Wi-Fi networks?
Well-managed enterprises should have functions in place to prevent an unauthorized mobile device, like the iPhone, from connecting to the network. In this expert response, Mike Chapple reveals some...25 Oct 2007
-
Mozilla to rush update for Firefox bugs
A massive update to the Firefox browser resulted in some stability issues and bugs, according to Mozilla. The vendor plans to rush a patch to repair the issues.25 Oct 2007
-
Trend Micro acquires Provilla for data protection
Provilla's fingerprint-based endpoint data leak prevention technology will allow Trend Micro to offer customers more effective data protection, company officials said Thursday.25 Oct 2007
Security Management Strategies for the CIO