-
Cybercrime forensics lab cinches high-profile cases
The Silicon Valley Regional Computer Forensics Laboratory pulls together evidence necessary to make a case in court.30 Aug 2007
-
Cisco issues CallManager security update
Security flaws in Cisco CallManager and Unified Communications Manager could be exploited for cross-site scripting and SQL injection attacks, but a security update is available.30 Aug 2007
-
Verizon completes Cybertrust integration
Verizon says Cybertrust has been assimilated into its Business Security Solutions group. The telecom giant is now playing up its ownership of Cybertrust's popular SMP program.30 Aug 2007
-
Independent security vendors struggle for stability, viability
With more security firms getting acquired, the staying power of the remaining independent vendors has been called into question. Some, like eEye, insist they're still viable.29 Aug 2007
-
Laptop theft exposes data of 106,000 taxpayers
Connecticut state officials acknowledged the theft of an employee laptop containing thousands of taxpayer names and Social Security numbers.29 Aug 2007
-
Flaw found in MSN Messenger
Attackers could exploit a flaw in MSN Messenger to run malicious code on targeted machines, according to Danish vulnerability clearinghouse Secunia.29 Aug 2007
-
Critical flaw found in Oracle developer tool
A popular tool used by Oracle developers contains a critical flaw that could be used by an attacker to compromise a system.29 Aug 2007
-
Microsoft Windows Vista challenges, pitfalls
This series highlights the setbacks and successes of those who are at various stages of deployment of Microsoft Vista.29 Aug 2007
-
BotHunter
BotHunter is a type of bot application that looks for other bots by tracking two-way communication flows between active software inside a private network and external entities... (Continued)28 Aug 2007
-
Patch Tuesday
Patch Tuesday, also known as Black Tuesday, is the second Tuesday of each month, when Microsoft releases the newest fixes for its Windows operating system and related software applications.28 Aug 2007
-
Rootkit found in older Sony USB device
F-Secure says it discovered rootkit technology in Sony's Micro Vault USM-F fingerprint reader software. The find comes two years after controversy over Sony's DRM technology.28 Aug 2007
-
iPhone not ready for the enterprise
While the Apple iPhone won't be the first choice of many enterprises, a group of industry analysts say it could have a positive impact on future devices.28 Aug 2007
-
Vendor IT shops also feel Windows Vista pain
Vendors don't like to hear it when their customers complain they were too slow in preparing their products for Vista compatibility.28 Aug 2007
-
Screencast: Google hacking, infosec style
In this exclusive screencast step-by-step demo, Tom Bowers explains how to ensure an organization's intellectual property doesn't fall into the wrong hands.27 Aug 2007
-
Perfect HIPAA security impossible, experts say
Two years after HIPAA security rules took effect, IT pros in the healthcare sector have found that constant security improvements are necessary for compliance.24 Aug 2007
-
No good way to measure HIPAA compliance
It's been two years since HIPAA took effect. But for many IT pros in the healthcare sector, measuring actual compliance is still a tricky task.24 Aug 2007
-
Shining a spotlight on rootkits
In this tip, contributor Scott Sidel discusses rootkit attacks, and unveils several free software tools that can help to assist security professionals in the rootkit detection process.23 Aug 2007
-
SANS: Attackers may be attempting Trend Micro exploits
The SANS Internet Storm Center (ISC) warns that attackers may be attempting to exploit flaws in Trend Micro products to hijack computer systems.23 Aug 2007
-
Enterprise risk management frameworks: Controls for people, processes, technology
Once responsibilities and requirements are defined, the next stage in developing a successful risk management framework involves developing controls. As Khalid Kark explains, that includes developi...22 Aug 2007
-
Experts: IDS is here to stay
IDS technology has survived predictions that it would be replaced by IPS. One expert says it will remain a separate product while IPS is folded into firewalls.22 Aug 2007
Security Management Strategies for the CIO