• September 05, 2007 05 Sep'07

    Citrix adds Web security with acquisition

    Citrix Systems Inc. said it acquired XML security vendor QuickTree for its compiler technology and Java API for XML processing.  Continue Reading

  • September 04, 2007 04 Sep'07

    All the IT in China

    The Financial Times has an interesting story today claiming that attackers affiliated with the Chines army have compromised some unknown number of machines at the Pentagon recently. The story is a ...  Continue Reading

  • September 04, 2007 04 Sep'07

    Botnets target eBay users

    Here's another example of how malicious hackers are in it for the money: Botnet owners are using their arsenal of hijacked computers to steal account information from eBay users. One victim, Sam ...  Continue Reading

  • September 04, 2007 04 Sep'07

    PCI Pain: Is it time for an overhaul?

    Although the intent of the PCI Data Security Standard is to protect confidential payment information and reduce fraudulent activity, the standard's high expectations have inspired security professionals to ask "Is it worth it?" In this tip, security...  Continue Reading

  • September 04, 2007 04 Sep'07

    Building malware defenses: From rootkits to bootkits

    There's an evolving form of malware on the scene that can silently and maliciously wreak havoc on operating systems. Meet the "bootkit" -- a rootkit variant reminiscent of the old-school boot sector virus. While software exists for rootkit detection...  Continue Reading

  • September 04, 2007 04 Sep'07

    Critical flaw discovered in IBM DB2

    IBM's DB2 database management system contains a flaw that could be exploited remotely by an attacker to take control of a system.  Continue Reading

  • September 02, 2007 02 Sep'07

    Bruce Schneier, Marcus Ranum debate home users and security

    Bruce Schneier and Marcus Ranum debate how to deal with the security problems posed by home computer users. Both dismiss user education, but Schneier believes ISPs should be forced to become IT departments while Ranum argues that building simpler ...  Continue Reading

  • September 02, 2007 02 Sep'07

    Ping: Nate Lawson

    Nate Lawson  Continue Reading

  • September 01, 2007 01 Sep'07

    How to dig out rootkits

    Stealthy and evasive, rootkits may own your systems. In this issue, expert Greg Hoglund tells you how to dig them out. Also, get tips on integrating physical and logical security, avoiding forensics missteps, and understanding standalone vendor ...  Continue Reading

  • September 01, 2007 01 Sep'07

    What CISOs need to know about computer forensics

    With computer forensics needed for civil litigation, human resources investigations and criminal cases, organizations need to ensure they're prepared and evidence is preserved. This feature details steps involved in computer forensics, common ...  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close