- November 23, 2010
Adobe Reader X uses Microsoft's sandboxing technology to block potentially dangerous processes from executing beyond the confines of the software.
- November 09, 2010
Microsoft repaired four vulnerabilities in its Forefront Unified Access Gateway and a critical flaw in Microsoft Office.
- October 07, 2010
The software giant said it would release 16 bulletins next week addressing flaws in Internet Explorer, Microsoft Office, and the .NET Framework.
- October 06, 2010
Adobe fixed 23 holes, including a critical zero-day vulnerability in Flash Player, which affects Flash components in Reader and Acrobat.
- June 22, 2010
The PCI Security Standards Council will update the PCI Data Security Standard on a new three-year cycle after the latest update is applied in October.
- January 04, 2010
The acquisition couples EMC's RSA security division with Archer's compliance management platform and builds on RSA's financial industry presence.
- January 24, 2008
With security experts predicting a shake-out in the NAC market, vendors are focusing on management tools as the best recipe for survival.
- August 01, 2007
Ron Moritz will depart after five years as CA's chief security strategist. It's the latest in a string of issues that have called the company's strategy into question.
- August 06, 2006
A network management expert and Windows MVP outlines highlights from the coming release of Microsoft's much-anticipated Windows XP Service Pack 2.
- December 05, 2005
In other news, a shoe retailer settles a data disclosure dispute with the FTC and a hacker figures out how to use an IE flaw to target Google Desktop.
- November 29, 2005
Attackers could exploit flaws in the Java Runtime Environment and Management Extensions to read and write local files or execute applications.
- October 01, 2005
Months have passed since her client came under legal scrutiny at Black Hat, but the attorney for Michael Lynn still has plenty to say about responsible vulnerability disclosure.
- September 12, 2005
Information Security magazine explains why Check Point's security management tool is "tight."
- August 30, 2005
Why does WinTel have all of the problems it does? Enquiring minds want to know.
- August 09, 2005
Latest variant masquerades as coming from recipient's IT department.