- Is vulnerability research still necessary?
- Judge tosses gag order against MIT students
- Researcher Matt Miller joins the Microsoft security team
- Hackers take over Discovery Channel on Prototype This!
- Russian cyberwar! Yes, no, maybe so?
- Software security is all grown up (or at least walking on its own)
- Exploiting Web business Web logic: I can’t hack it, but can I steal it?
- Symantec sees threat to presidential campaigns
- Microsoft to issue seven critical patches
- Vista functionality still wins over security
- Rustock botnet top spam spewer
- Fyodor meets his fans at Black Hat; unveils Worldscan
- Dowd and Sotirov’s Vista exploit talk is the talk of the town
- Symantec acquires nSuite
- Juniper Networks announces new UAC
- McAfee buys DLP vendor Reconnex
- California elections official wins over techies
- Study highlights Web threats
- Aladdin buys Secure Computing’s SafeWord
- Symantec upgrades NAC with better guest user integration
- Emergency fix in the works for critical Oracle flaw
- HIPAA violations cost Seattle health care provider
- Study shows most bank Web sites have serious security design flaws
- Intel & Symantec tout app virtualization
- Why are security pros dealing with compliance?
- SQL injection infects more high profile websites
- Report: Breach exposes Justice Breyer’s personal data
- Mozilla aims for Firefox security metrics
- Verisign names new CEO
- Barracuda countersues Trend Micro
- Sourcefire rejects Barracuda again
- Google releases Ratproxy security assessment tool
- Alleged Nugache author takes plea deal
- The changing face of information security
- Srizbi botnet blamed for malicious spam surge
- Yahoo Mail flaw found and fixed
- Proofpoint acquires email archiving provider Fortiva
- TippingPoint reports Firefox 3.0 flaw
- Panda security researchers warn of new worm tool
- Third Brigade acquires OSSEC project
- Billing records of 2.2 million stolen
- Critical flaw found in SNMPv3
- Stanford issues alert about stolen laptop
- Trend Micro warns of MySpace phishing attack
- Hong Kong is the shadiest neighborhood on the Net
- Sophos video ties malware to Google Earth, Britney Spears
- Walter Reed message discloses P2P connection to breach
- Users may be the weakest link, but it’s not their fault
- TrendLabs warns of fake Microsoft critical updates
- Another security breach at UCSF
- Sourcefire says no, no, no to Barracuda’s takeover bid
- Identity fraud trends: good and bad
- Spear phishing attack spoofs U.S. Tax Court
- International phishing ring busted
- Orphaned accounts overlooked
- VeriSign offering free re-issues of SSL certificates
- SSH keys and SSL certificates at risk from new Debian OpenSSL flaw
- Srizbi botnet is the biggest, but does size matter?
- Security vet Anne Bonaparte takes CEO job at Solidcore
- New SQL injection worm making the rounds
- Spammers exploit social networking sites
- Microsoft releases Windows XP SP3
- Pioneering online privacy firm Anonymizer acquired
- Why lateral SQL injection and NULL pointer attacks matter
- Sophos: Sharp rise in Web threats
- Secure Computing CEO steps down
- IBM Phantom to analyze virtual security
- Richard Stiennon joins new MSSP as CEO
- Fighting security FUD
- Flaw fixes for Firefox, Mac
- Oracle preps CPU for 41 flaws
- RSA 2008: Firm makes log management a priority for compliance
- RSA 2008: Sourcefire founder Roesch previews Snort 3
- RSA 2008: Verizon, AT&T tout security at RSA (Part 2)
- RSA 2008: Verizon, AT&T tout security at RSA (Part 1)
- Where have all the good RSA talks gone?
- RSA 2008: Financial industry security challenges
- RSA 2008: Hacking techniques
- RSA 2008: Defeating botnets
- RSA Panel: National data breach law unlikely
- Fire laws trump a full-conference fee at RSA
- Hitachi acquires M-Tech to broaden security
- HP: Would you like some malware with your server?
- RealPlayer flaw being actively exploited
- Your PCI questions answered
- Hannaford and the industrial compliance complex
- New Apple Air notebook vaporized in PWN2OWN contest
- Researcher: IFrame redirect attacks escalate
- Vista SP1 experiences: The good and the bad
- DHS takes a chance with new cybersecurity chief Beckstrom
- The data breach that hit home
- Lockdown Networks shuts its doors
- Hannaford and the evolution of the data breach
- Supermarket chain discloses breach
- How to ask a VC for money
- Researcher: Beware of massive IFrame attack
- Trend Micro site compromised
- The wit and wisdom of Dan Geer
- McAfee discovers 10,000 malware-laced sites
- Virtualization, cloud computing and the race to deploy
- More