-
Skype Trojan records VoIP communications
Called the first wiretap Trojan, Peskyspy, targets Skype conversations by intercepting and recording audio between the Skype application and the victim's audio device.31 Aug 2009
-
Is there a way to block iPhone widgets that bypass Web filters?
If students are using your Wi-Fi to reach unapproved websites, you have the ability to take greater control of your network. Michael Cobb reviews the important aspects of a Web usage policy.28 Aug 2009
-
Will an application usage policy best control network bandwidth?
When it comes to speeding up the network, what works best: policy or technology? Both are important and should be used together, says expert Michael Cobb.28 Aug 2009
-
SSH key compromise shuts down Apache website
Attackers forced Apache to shut down its website for several hours Friday morning, using a compromised SSH key to gain access to one of its servers.28 Aug 2009
-
Should businesses delay Windows Vista adoption and just buy Windows 7?
In many ways, the security features in Windows 7 are the result of Vista users' feedback and experiences. But should enterprises adopt the OS right away?28 Aug 2009
-
Does an EULA make it truly illegal to decompile software?
Michael Cobb explores a legal minefield: the legality of software decompilation.28 Aug 2009
-
Should management processes change based on a patch release schedule?
Expert Michael Cobb explains why planned patch release schedules, though helpful, may alter they way you handle the deployment of your own updates.28 Aug 2009
-
Can an IP spoofing tool be used to spam SPF servers?
Michael Cobb explains what the Sender Policy Framework can and cannot protect against, including IP spoofing attacks.28 Aug 2009
-
Should enterprises be concerned with Twitter in the workplace?
Expert Michael Cobb explains how concerned you should be with Twitter use inside the company.28 Aug 2009
-
What are new and commonly used public-key cryptography algorithms?
Expert Michael Cobb breaks down a variety of encryption algorithms and reviews the use cases for several types of cryptography.28 Aug 2009
-
Why should we place data files on a separate partition than the OS?
You may have always been taught to install applications on a different partition than the OS, but do you actually know why?28 Aug 2009
-
Are there still Google Desktop security problems?
Expert Michael Cobb explains why Google Desktop's "search across computers" feature has been so controversial.28 Aug 2009
-
How to find HIPAA transaction code sets and HITECH resources
Complying with HIPAA and the new HITECH regulations is no small matter, and that's where HIPAA transaction code sets and HITECH resources for compliance can help. Learn where to find these resource...27 Aug 2009
-
Security expert's PCI analysis misguided, says PCI Council GM
The PCI Council asserts that everyone in the payment chain should play a role to keep payment information secure, says Bob Russo, general manager of the PCI SSC.27 Aug 2009
-
Electronic Frontier Foundation calls social networking privacy study alarming
A privacy study that discovered social networks revealing identifying information to marketing and Web analytics firms is a sign that urgent action is needed, the EFF said.27 Aug 2009
-
How to set up a split-tunnel VPN in Windows Vista
Setting up a split-tunnel VPN in Vista can help quicken network flow in the enterprise. In this expert response, Mike Chapple explains the steps to create a split-tunnel VPN.26 Aug 2009
-
Social network privacy study finds identity link to cookies
Researchers raise privacy concerns as a person's browsing habits could be paired with their identity and passed to third-parties.26 Aug 2009
-
IBM finds sharp spike in malicious content on trusted sites
Latest midyear trend report finds users being bombarded with malicious Web links. Attackers target trusted search engines, blogs and mainstream news sites to pass malicious code.26 Aug 2009
-
DEFCON survey suggests hacker community on vacation
Hackers beat the heat prior to the lucrative holiday season, according to a survey given to attendees at the DEFCON hacker conference.25 Aug 2009
-
Should Windows Mobile updates come from Microsoft?
As mobile phones become more like mini PCs, they need similar add-on security tools and patch processes to keep them safe. Michael Cobb reviews how to manage Windows Mobile updates.25 Aug 2009
Security Management Strategies for the CIO