-
Google researchers out kernel bugs in Windows, Linux and VMware
Google engineers find 20 kernel flaws, half of which are still not patched.31 Mar 2010
-
Smartphone malware pre-installed: The next security threat
Pre-installed smartphone malware is a growing problem and security pros need to be aware of how this malware could creep into your organization.31 Mar 2010
-
Economic recovery strategies for information security professionals
Security teams will continue to focus on efficiency and alignment with business as the economy recovers30 Mar 2010
-
ISP shutdown slows Zeus botnet
Security experts say the Zeus botnet was slowed with the shutdown of Troyak, an ISP serving a large chunk of the Zeus botnet30 Mar 2010
-
Technologies to thwart online banking fraud
Today's anti-fraud technologies create gated communities for online banking.30 Mar 2010
-
Removable storage device endpoint security and control
Endpoint security and control for devices like thumb drives, SIM cards and mobile devices can no longer be ignored.30 Mar 2010
-
Information Security Profession Takes Two Steps Backward
The information security profession took two steps backwards with the firing of Pennsylvannia's CISO because of his comments on a conference panel, which illustrates the continuing disconnect betw...30 Mar 2010
-
Schneier-Ranum Face-Off: Should the Government Stop Outsourcing Code Development?
Is outsourcing code development a threat to national security? Marcus Ranum and Bruce Schneier go head-to-head on this topic.30 Mar 2010
-
What are the differences between symmetric and asymmetric encryption algorithms?
In this expert response, Michael Cobb explains the differences between symmetric and asymmetric encryption algorithms and the pros and cons of each.30 Mar 2010
-
Microsoft emergency patch addresses IE vulnerabilities, zero-day
Patch security professionals say that Microsoft's emergency update addressing IE vulnerabilities should be applied quickly.30 Mar 2010
-
Adobe Acrobat Reader security: Can patches be avoided?
Security expert Michael Cobb counters recent advice from Fiserv not to install Adobe Reader patches and says these updates are vital to security and must trump user functionality.30 Mar 2010
-
Cloud computing legal issues
Lawyers have a lot of concerns about cloud computing services. Learn about cloud computing legal issues30 Mar 2010
-
Creating a proactive enterprise security incident response program
Every organization should develop a proactive security incident response program to ensure that when an incident does occur, it can be handled quickly and efficiently. Contributor Marcos Christodon...29 Mar 2010
-
Emergency Microsoft patch fixes IE zero-day vulnerability
Microsoft will release an emergency security update for Internet Explorer that patches a remote execution vulnerability in the Web browser.29 Mar 2010
-
SANS Top 25 programming errors: Application security best practices
Learn the SANS Top 25 programming errors and the best practices for application security.29 Mar 2010
-
Separation of duties: Internal user account controls
If your user account administration is dispersed among different departments, you might be looking into centralizing it. This can work, provided you have a trustworthy administrator and separation ...29 Mar 2010
-
Stolen portable media device blamed in breach of 3.3 million
Educational Credit Management Corp. (ECMC), a major federal loan guarantor, blames a stolen portable media device for the data loss on approximately 3.3 million individuals.29 Mar 2010
-
How to use Malwarebytes to scan for and remove malware
This month, Peter Giannoulis from TheAcademyPro.com offers a video demonstration of Malwarebytes' Anti-Malware, a free tool that can eliminate many of the especially difficult or hidden viruses and...29 Mar 2010
-
fuzz testing (fuzzing)
Fuzz testing or fuzzing is a technique used by ethical hackers to discover security loopholes in software, operating systems or networks by massive inputting of random data to the system in an atte...26 Mar 2010
-
TJX hacker gets 20 years in prison in Heartland case
A day after his sentencing in the TJX hacking case, Albert Gonzalez is sentenced to 20 years in prison for Heartland26 Mar 2010
Security Management Strategies for the CIO