Email Alerts
-
Security Blog Wire: Symantec flaw parallels Sony BMG
This week's blog roundup focuses on Symantec and whether it borrowed a page from the Sony BMG playbook by using a hidden program. Column | 13 Jan 2006
-
Security Bytes: Flaws plague Symantec, McAfee
Meanwhile: An IM worm exploits the holidays, Cisco offers workarounds for vulnerabilities in IOS and Oracle is using Forify's technology to boost security. Article | 21 Dec 2005
-
For Microsoft, security and trust prove elusive
Following the recent beta release of its OneCare Live security offering, Microsoft seems poised to dip its toe into the lucrative enterprise security and software services market. Despite its long history of security snafus and monthly patches, the s... Article | 15 Dec 2005
-
New algorithm promises to secure P2P content
Three cryptographers have developed a secure P2P content distribution method without creating bottlenecks, and it could prove to be a significant breakthrough in the encryption arena. Article | 30 Nov 2005
-
Sony rootkit uninstaller causes bigger threat
Princeton researchers say a security hole that appears when users try to remove Sony's copy protection software presents an even greater risk than the original rootkit. Article | 15 Nov 2005
-
Security Bytes: FTC cracks down on alleged spyware distributors
Patches fix serious RealPlayer flaws, IM malcode launches phishing attacks; Microsoft warns of Macromedia Flash flaw; Liberty Alliance pushes stronger authentication; FEMA data security is in question; patches fix Veritas flaws and TransUnion suffers... Article | 11 Nov 2005
-
Review: Series of tools helps shore up faulty coding
Secure Software's CodeAssure Suite is for programmers, not security engineers. But developers will benefit from its findings during product development. Article | 03 Nov 2005
-
Reporter's Notebook: NYC 'controls the software industry'
At Information Security Decisions: a security "rock star" rages against the Microsoft machine; banging the drum for enterprise security; a sour note on zero-day exploits. Article | 24 Oct 2005
-
Powerful payloads: The evolution of exploit frameworks
Attackers have new tools to launch faster, more powerful attacks. Contributor Ed Skoudis offers up some examples, some of which are very clever and very evil. Article | 19 Oct 2005
-
Exploit code lurks following new Windows patches
Windows IT managers work to apply critical fixes before exploit code that may have Zotob-like effects can harm vulnerable systems. Article | 14 Oct 2005
Security Management Strategies for the CIO