Recent articles by Jim Carr

Gartner declares iPhone ready for enterprise

Gartner declares iPhone ready for enterprise

Apple's iPhone will soon be "ready for business," according to analysts at research firm Gartner, which originally labeled the popular mobile device unfit for enterprise deployment.
Jim Carr Mar 22 2008 4:43PM Security
Crowded NAC space spells doom for Lockdown Networks

Crowded NAC space spells doom for Lockdown Networks

The recent closing of Lockdown Networks, one of the early entrants in the crowded network access control (NAC) marketplace, should not come as a shock to anyone, according to analysts.
Jim Carr Mar 22 2008 4:43PM Security
Breach of Britney Spears patient data highlights health care security shortfalls

Breach of Britney Spears patient data highlights health care security shortfalls

Reports this week that the UCLA Medical Center has moved to fire 13 employees and suspended six others for unauthorised access to confidential medical records of pop star Britney Spears is a sign that training and regulations may not be working in some hospitals, experts told SCMagazineUS.com.
Jim Carr Mar 20 2008 10:28AM Security
Adobe, Cisco advisories warn of "critical" vulnerabilities

Adobe, Cisco advisories warn of "critical" vulnerabilities

Adobe and Cisco have released security advisories covering vulnerabilities that, in some cases, would allow an attacker to take control of an infected system.
Jim Carr Mar 18 2008 10:23AM Security
Click-fraud trojan targeting Yahoo, Google: Symantec

Click-fraud trojan targeting Yahoo, Google: Symantec

Security researchers at Symantec have uncovered a click-fraud trojan targeted to the online advertising networks of Google, Yahoo and Baidu.com, China's largest independent internet search engine.
Jim Carr Mar 17 2008 10:02AM Security
Microsoft releases Beta 1 version of IE 8, with new security features

Microsoft releases Beta 1 version of IE 8, with new security features

Microsoft on Wednesday released the Beta 1 version of Internet Explorer 8, which the company says is configured to protect against phishing attacks and malware.
Jim Carr Mar 13 2008 9:45AM Security
Microsoft patches Excel zero-day bug, three other flaws

Microsoft patches Excel zero-day bug, three other flaws

Microsoft issued four "critical" patches, including one for the zero-day Excel vulnerability reported in January, in its March Patch Tuesday round of bug fixes. In all, the company corrected 12 vulnerabilities, all client-side problems associated with its Microsoft Office productivity suite.
Jim Carr Mar 12 2008 10:00AM Security
California data breach law expands

California data breach law expands

California's extension of its data breach notification law to cover health care records promises to have significant impact on how medical organisations deal with patient information.
Jim Carr Mar 11 2008 9:57AM Security
Sun Microsystems addresses critical Java flaws

Sun Microsystems addresses critical Java flaws

Sun Microsystems has released product updates to correct several "highly critical" vulnerabilities in its Java programming environment.
Jim Carr Mar 10 2008 10:40AM Security
Microsoft to deliver four patches in March cycle

Microsoft to deliver four patches in March cycle

Microsoft said on Thursday that next week it will release four patches, all of them critical, with one apparently fixing a zero-day Excel vulnerability.
Jim Carr Mar 7 2008 11:15AM Security
Hackers claim RFID smart-card hack, but chip vendor disagrees

Hackers claim RFID smart-card hack, but chip vendor disagrees

A semiconductor company on Tuesday disputed claims by a hacker that he can access the firm's radio-frequency identification (RFID) chips to jeopardise the security of billions of credit card users.
Jim Carr Mar 6 2008 10:42AM Security
TRACE: Six botnets generate 85 percent of spam

TRACE: Six botnets generate 85 percent of spam

Six botnets are generating about 85 percent of all spam, according to security researchers at Marshal's TRACE labs. Mega-D and Srizbi have been trading places recently at the top of the spam menace list.
Jim Carr Mar 5 2008 10:27AM Security
Fake Department of Justice complaint-spam strikes again

Fake Department of Justice complaint-spam strikes again

In what could presage a rash of tax-time spam emails purportedly from government agencies, security researchers at MX Logic have uncovered an influx of keylogger-laden emails spoofing the U.S. Department of Justice (DOJ).
Jim Carr Mar 4 2008 9:31AM Security
VMware releases API that simplifies securing virtalised environments

VMware releases API that simplifies securing virtalised environments

On the day that Microsoft jumped into the burgeoning virtualisation market, VMware -- the pioneer and industry leader in this technology -- has announced a new product that significantly enhances and simplifies securing virtual machines.
Jim Carr Feb 29 2008 9:41AM Security
"Critical" Linux kernel flaws discovered

"Critical" Linux kernel flaws discovered

Three "critical" vulnerabilities have been discovered in the Linux kernel found in many of the widely used distribution versions of the popular open source operating system.
Jim Carr Feb 28 2008 9:42AM Security
Google's Orkut hit by self-propagating trojan

Google's Orkut hit by self-propagating trojan

Security researchers at Symantec said that attackers are for the first time using a social networking site -- in this case, Google's Orkut -- to deliver a self-propagated trojan. The worm is infecting the computers of those on the buddy lists of Orkut users, according to Symantec.
Jim Carr Feb 27 2008 10:02AM Security
'Link hack' redirects MySpace visitors to phishing site

'Link hack' redirects MySpace visitors to phishing site

Security researchers at Websense have uncovered what they called a "link hack" that bypasses the attempts of social networking website MySpace.com to control and filter the links on its pages.
Jim Carr Feb 27 2008 10:02AM Security
Researchers turn Sun Solaris utility into fuzzing tool

Researchers turn Sun Solaris utility into fuzzing tool

Security researchers have developed a way to turn a utility for Sun Microsystems' Solaris operating system into a rootkit-like, reverse engineering tool that can be deployed to quickly locate application vulnerabilities and create exploits.
Jim Carr Feb 27 2008 10:02AM Security
Two vulnerabilities found in VMware virtualisation products

Two vulnerabilities found in VMware virtualisation products

Security researchers have uncovered a pair of vulnerabilities in VMware software, virtualisation technology used to run multiple versions of an operating system on a single computer. One flaw affects a server version of the software, the other is found in desktop software.
Jim Carr Feb 26 2008 10:16AM Security
Google, Cleveland hospital begin pilot online medical records project

Google, Cleveland hospital begin pilot online medical records project

In a move some say could compromise the privacy of hospital patients, Google has announced it will begin a pilot test of an online health service that will store the medical records of several thousand Cleveland Clinic medical center patients.
Jim Carr Feb 25 2008 11:07AM Security

Log In

  |  Forgot your password?