-
Wireless security: IT pros warily watching mobile phone threats
Security experts have warned repeatedly that mobile phone attacks will grow as the devices become more sophisticated. IT administrators are starting to believe them.28 Feb 2007
-
'Worm' targets Sun Solaris Telnet flaw
Security researchers have found evidence that a worm is trying to exploit the recently patched Telnet flaw in Sun Solaris. Experts say it's another reason to stay away from Telnet.28 Feb 2007
-
Black Hat presenter nixes RFID cloning demo under pressure
A demonstration of a device that could easily clone radio frequency identification (RFID) badges, was pulled from a conference presentation under pressure from a chip maker.28 Feb 2007
-
McAfee fixes flaw in Mac antivirus software
Attackers could exploit the hole in McAfee's Virex 7.7 antivirus program for Mac OS X to bypass the malware scanner, but a fix is available.28 Feb 2007
-
Forget ROI; Use Six Sigma to prove business value
The classic ROI equation doesn't apply to information security, but that doesn't stop management from asking for metrics. Learn how Six Sigma can be used to prove the business value of security.28 Feb 2007
-
Early DST start causes security heartburn
IT professionals say the earlier start to daylight-saving time (DST) could have unintended security consequences, such as timing glitches in their forensic and auditing tools.27 Feb 2007
-
RFID privacy, security should start with design
Companies planning to deploy radio frequency identification technology (RFID) must demand that privacy and security issues are addressed in the design and procurement phases of the implementation, ...27 Feb 2007
-
Storm rages again: Self-morphing Trojan uses blogs to spread rootkits
A new variant of the Storm Trojan that changes with each download is infecting blog sites with malicious URLs, intercepting traffic when visitors try to post comments.27 Feb 2007
-
Windows Vista: Security issues to consider
Windows Vista is now in the wild. With its myriad new security features, are enterprises foolish not to adopt right away? In this tip, contributor Michael Cobb examines the security-related pros an...27 Feb 2007
-
DOM property issue among several spurring Firefox update
he Mozilla update fixes Firefox flaws digital miscreants could exploit to circumvent security restrictions, conduct cross-site scripting attacks and access sensitive information.26 Feb 2007
-
PatchLink acquires STAT Guardian tool
PatchLink Corp. says it will add more muscle to its vulnerability management portfolio by acquiring the STAT Guardian tool from IT vendor Harris Corp.26 Feb 2007
-
Microsoft takes a blogosphere beating over Vista UAC
This week in Security Blog Log: Industry experts take Microsoft to task over a "very severe hole" in the design of Vista's User Account Controls (UAC) feature.23 Feb 2007
-
Flaws haunt Symantec, IBM, Cisco and IE
Bug Briefs: Security holes plague Symantec Norton products, IBM DB2; Mozilla Firefox; Trend Micro ServerProtect; Cisco IP phones; Google Desktop; IE and Snort.23 Feb 2007
-
Cisco warns of IP phone flaws
Attackers could circumvent security restrictions by exploiting flaws in certain Cisco IP phones, the networking giant warned Wednesday.22 Feb 2007
-
Data breach: If customers don't act, data will remain at risk
To make enterprises take data security seriously, customers must take control of their personally identifiable information and stop handing it out to businesses.22 Feb 2007
-
Cisco routers threatened by drive-by pharming
Millions of Cisco routers in circulation could be compromised by a newly-discovered attack technique Symantec calls drive-by pharming, the networking giant warned in an advisory.21 Feb 2007
-
Cisco to acquire Reactivity for $135 million
One analyst says Cisco will benefit from Reactivity's policy and threat management capabilities.21 Feb 2007
-
Google plugs dangerous flaw
An attacker could exploit a hole in Google Desktop to gain access to users' personal files. Google has released a patch, but experts say not all users are receiving it.21 Feb 2007
-
Microsoft confirms new IE flaw
Attackers could exploit a new flaw in Internet Explorer (IE) to access local files on targeted systems, Microsoft confirmed Tuesday.21 Feb 2007
-
TJX data breach worse than initially feared
Hackers had access to a larger amount of customer data, TJX executives said in a statement.21 Feb 2007
Security Management Strategies for the CIO