October 2006
-
October 31, 2006
31
Oct'06
Instant messaging attacks rise in October
In October alone, security firm Akonix Systems tracked 88 attacks that used instant messaging programs to spread. Attackers are also exploiting P2P programs. Continue Reading
-
October 31, 2006
31
Oct'06
Quiz: Essential practices for securing mobile devices
A five-question multiple-choice quiz to test your understanding of the content presented in the Essential practices for securing mobile devices lesson of SearchSecurity.com's Messaging Security School. Continue Reading
-
October 31, 2006
31
Oct'06
Podcast: Platform protection -- Security issues for mobile devices
This 10-minute podcast features a Q&A-style back-and-forth interview with Lisa Phifer, a renowned instructor and conference speaker in the realm of mobile security. The podcast summarizes the security issues facing today's popular mobile device ... Continue Reading
-
October 31, 2006
31
Oct'06
Podcast: Top 5 quick tips for safer instant messaging
Michael Cobb of Cobweb Applications counts down five quick tips that can secure IM in the enterprise. Cobb discusses account naming rules, acceptable use policy, instant messaging encryption and much more. Continue Reading
-
October 31, 2006
31
Oct'06
Quiz: Secure instant messaging
A five-question multiple choice quiz to test your understanding of the content presented in the Secure instant messaging lesson of SearchSecurity.com's Messaging Security School. Continue Reading
-
October 31, 2006
31
Oct'06
Taking the bite out of Bluetooth
Bluetooth has become a ubiquitous short-range wireless protocol embedded in many mobile devices, but it has been plagued by security threats. In this tip, Lisa Phifer details those threats and explains how any organization can stay safe by following... Continue Reading
-
October 31, 2006
31
Oct'06
Firefox fans unfazed by IE 7
IT administrators like the security improvements in IE 7. But for those who use Firefox, Microsoft's browser upgrade isn't enough to make them switch. Continue Reading
-
October 31, 2006
31
Oct'06
Latest IM attacks still rely on social engineering
In the age of email-borne superworms, email recipients would often become victims without any interaction or warning. However, as Michael Cobb explains, many of today's most dangerous instant messaging attacks require user interaction, meaning wary,... Continue Reading
-
October 31, 2006
31
Oct'06
Messaging Security School
SearchSecurity.com's Messaging Security School has brought together some of the most knowledgeable experts in the messaging security field to offer you personal instruction on how to secure the information handled by your organization's knowledge ... Continue Reading
-
October 31, 2006
31
Oct'06
Countermeasures for malicious email code
Today's malware continues to raise the security stakes. Enterprises are now facing numerous evolving threats like targeted and blended attacks, zero-day exploits, botnets and phishing schemes. The attacks aren't the only things evolving; so are ... Continue Reading
-
October 31, 2006
31
Oct'06
Quiz: Countermeasures for malicious email code
A five-question multiple-choice quiz to test your understanding of the content presented in Countermeasures for malicious email code lesson of SearchSecurity.com's Messaging Security School. Continue Reading
-
October 31, 2006
31
Oct'06
Podcast: Fact or fiction -- The future of email attacks
What will the future hold regarding email attacks? In this expert podcast, Tom Bowers will confirm or debunk a number of common beliefs about what's coming next. Continue Reading
-
October 31, 2006
31
Oct'06
Survey: Data breach costs surge
A new study by the Ponemon Institute finds a 31% increase in the costs associated with a data breach. Continue Reading
-
October 31, 2006
31
Oct'06
Strategic considerations for an integrated malware defense
Not only does it take several technologies to keep an enterprise malware free, but those pieces must fit together like a well-crafted puzzle. Tom Bowers explains which product categories are must-haves and what to consider when putting your ... Continue Reading
-
October 30, 2006
30
Oct'06
Podcast: Expert sees rise in sophisticated attacks
In this edition of Security Wire Weekly, Andreas Wiegenstein, chief technology officer of Virtual Forge discusses why application security attacks are becomming more sophisticated. Continue Reading
-
October 30, 2006
30
Oct'06
Triple trouble for Microsoft users
Security researchers have reported three flaws affecting Microsoft, including two Internet Explorer glitches and a vulnerability affecting organizations that share Internet connections. Continue Reading
-
October 30, 2006
30
Oct'06
Airline security pro specializes in meeting mandates
Andre Gold, director of information security at Continental Airlines has been meeting seemingly impossible mandates for the airline. His work earned him a Security 7 award. Continue Reading
-
October 30, 2006
30
Oct'06
PING with Aviel Rubin
In this exclusive interview with Information Security magazine, Aviel Rubin, author of "Brave New Ballot" examines security problems in e-voting machines, and details why isn't just a cause for concern, it's a matter of national security. Continue Reading
-
October 27, 2006
27
Oct'06
Security Blog Log: The never-ending PatchGuard debate
This week, security vendor fright over the Windows Vista PatchGuard feature permeates the blogosphere. Is Microsoft the boogeyman, or just misunderstood? Continue Reading
-
October 26, 2006
26
Oct'06
Sourcefire looking to go public
The company behind the popular Snort open source IDS tool is making a bid to go public, months after its deal to be acquired by Check Point collapsed. Continue Reading