-
Rogue digital certificates strike blow to Internet security
Security researchers exploit weaknesses in digital certificates to bypass browser security. Experts say the method is within reach of well-funded cybercriminals.30 Dec 2008
-
Top 5 cybersecurity news stories of 2008
A look at the security stories dominating the news in 2008, including data breaches, SQL injection attacks, DNS dangers, Microsoft Vista adoption issues and the fight against spam.29 Dec 2008
-
Open source security concerns can trump cost savings
Despite tough economy, Palamida survey shows companies are hesitant to broaden open source use.29 Dec 2008
-
Microsoft Windows XML flaw exploits test desktop antimalware
An NSS Labs test of six business products yield disappointing results.24 Dec 2008
-
Will cloud computing and virtualization save the day?
Will cloud computing and virtualization make enterprises more secure or leave them more vulnerable? At Information Security Decisions 2008, security researchers discuss the pros and cons of the ine...24 Dec 2008
-
Defending against Internet security threats and attacks
From buffer overflows to cross-site scripting, Web threats are many. Security researchers at Information Security Decisions 2008 discuss how to keep enterprises safe from these attacks (part 2 of 4).24 Dec 2008
-
The importance of secure software development training
At Information Security Decisions 2008, security researchers discuss secure application coding and how to teach best practices to young developers (part 4 of 4).24 Dec 2008
-
The future of exploit vulnerability research
At Information Security Decisions 2008, security researchers discuss the most vulnerable network points and the future of the SDLC (part 1 of 4).24 Dec 2008
-
Screencast: How to gather host-level data with Network Miner
Peter Giannoulis of www.theacademypro.com demonstrates how to use Network Miner, an open source, passive network sniffer tool that hasn't received the attention that it deserves.23 Dec 2008
-
Microsoft warns of SQL Server zero-day
Code is publicly available targeting an unpatched flaw in SQL Server to gain access to critical files and execute malicious code.23 Dec 2008
-
Check Point to acquire Nokia security appliance business
Check Point said its acquisition of Nokia's security business will help it expand its line of security products.22 Dec 2008
-
After a data breach, are there legal implications of sharing details?
After a data breach, it may be helpful to share the highs and lows of the experience with other companies to help prevent similiar breaches, but what are the legal implications of this? Learn how t...22 Dec 2008
-
Use BotHunter for botnet detection
Got bots? Hopefully not, but how can you be sure? Learn about botnet detection with the help of a free tool, BotHunter. This can keep your computers from participating in a botnet and subsequently ...22 Dec 2008
-
Is there a free enterprise-caliber password-management tool?
Enterprise-caliber password-management tools can be very expensive. Learn about a few free open source password management tools that can improve IAM at your enterprise.19 Dec 2008
-
Adobe issues warning for Linux users
A dangerous flaw in Adobe Flash Player for Linux could allow an attacker to take control of an affected system.19 Dec 2008
-
Countdown: Tips for effective end-user security education programs
Get tips for creating an effective end-user security education program to help safeguard your organization's critical resources and increase overall business performance.18 Dec 2008
-
How to prevent clickjacking attacks with security policy, not technology
Clickjacking, an emerging hacker technique similar to cross-site scripting, tricks a user into executing malicious commands on a seemingly legitimate or innocent website. John Strand reviews how th...18 Dec 2008
-
Microsoft issues emergency patch to fix IE flaw
The software giant repaired a dangerous flaw being exploited if a user browses some legitimate websites.17 Dec 2008
-
Adobe hopes to speed patch releases with more transparency
Poor communication with security researchers fuels inefficiencies, the software maker said.17 Dec 2008
-
Mozilla fixes cross-site-scripting flaws
The latest update also phases out support of Firefox 2.17 Dec 2008
Security Management Strategies for the CIO