Features

Phishers move into pharming

Phishers move into pharming

The next generation of phishing attacks will redirect users to bogus websites when they try to visit legitimate sites, email security firm MX Logic warned.
Staff Writers Feb 22 2005 2:56PM Security
MS AntiSpyware set for enterprise functionality

MS AntiSpyware set for enterprise functionality

Microsoft could build enterprise functionality into its nascent anti-spyware software as early as the second half of this year.
John Sterlicchi Feb 22 2005 2:54PM Security
Keeping email as a service, not as a security hole

Keeping email as a service, not as a security hole

Email may make communication easier, but it is open to a variety of security and productivity issues.
Michael Patterson Feb 22 2005 2:51PM Security
Firms realize that playing it safe is the riskier option

Firms realize that playing it safe is the riskier option

Nobody wants to be the first to try any new or innovative tool, product or technique. You know the old saw: "Never buy version 1.0 of a product."
Peter Stephenson Feb 22 2005 2:42PM Security
T-Mobile USA emphasizes security as details of 2003 breach emerge

T-Mobile USA emphasizes security as details of 2003 breach emerge

T-Mobile USA says it has made security a top priority after it emerged that a hacker had broken into the company's internal systems and viewed customer details.
Staff Writers Feb 22 2005 2:27PM Security
Visa and MasterCard act to align data protection

Visa and MasterCard act to align data protection

Visa and MasterCard International have aligned their separate programs for protecting cardholder data into a single standard for the payment card industry, streamlining what some say was a confusing situation for merchants.
Marcia Savage Feb 22 2005 2:20PM Security
Honeypot Project finds decline in Linux attacks

Honeypot Project finds decline in Linux attacks

Unpatched Linux systems are lasting longer on the internet before being compromised, according to a study by the Honeynet Project, a nonprofit group of security professionals that researches online attackers' methods and motives.
Marcia Savage Feb 22 2005 2:04PM Security
Mobile virus developer denies doing any harm

Mobile virus developer denies doing any harm

David Quainton reports on the Brazilian virus writer responsible for Lasco
David Quainton Feb 22 2005 1:15PM Security
Vendors line up to see Jericho vision

Vendors line up to see Jericho vision

The user forum prepares to unveil its ambitions for the future.
Ron Condon Feb 22 2005 1:05PM Security
Institute is in with a fighting chance

Institute is in with a fighting chance

The industry is rallying behind a new professional body, finds David Quainton
David Quainton Feb 22 2005 12:52PM Security
Exodus from DHS gains momentum

Exodus from DHS gains momentum

The exodus from the U.S. Department of Homeland Security (DHS) has continued with two more senior officials leaving.
Barbara Gengler Feb 22 2005 12:46PM Security
Vernier supports Microsoft

Vernier supports Microsoft

Staff Writers Feb 22 2005 12:36PM Security
Lucid and NCS strike OEM deal

Lucid and NCS strike OEM deal

Staff Writers Feb 22 2005 12:34PM Security
Intellitactics teams with Merlin

Intellitactics teams with Merlin

Staff Writers Feb 22 2005 12:31PM Security
How to delve into the hacker’s mind

How to delve into the hacker’s mind

The first person to hold a PhD in forensics, Emlyn Everitt tells David Quainton that the battle for security begins in the boardroom
David Quainton Feb 22 2005 12:24PM Security
How to cut patchwork… and save a cool $100m

How to cut patchwork… and save a cool $100m

The Air Force was spending more on system patches than on software. Something had to change, as John Gilligan tells Marcia Savage .
Marcia Savage Feb 22 2005 11:56AM Security
It’s good to talk security

It’s good to talk security

Who is responsible for your infosec? Jaime Chanaga suggests you start a dialog with your vendors to find out
Jaime Chanaga Feb 22 2005 11:36AM Security
We must learn to love compliance

We must learn to love compliance

Fear of legal action is driving companies to comply with new legislation, but there are positive benefits, too, as David Quainton discovers
David Quainton Feb 22 2005 11:11AM Security
Paper over online cracks

Paper over online cracks

Online authentication security is vital, but much of it can be carried out in a paper review, says Gunter Ollmann
Gunter Ollmann Feb 21 2005 5:32PM Security
So, friend or foe? ID management and access control

So, friend or foe? ID management and access control

Companies need to rationalize their access policies if they are to comply with the new regulations, as Charles Hayhoe explains
Charles Hayhoe Feb 21 2005 5:14PM Security

Log In

  |  Forgot your password?