Features

The growing menace of rootkits

The growing menace of rootkits

Rootkits are a fast-emerging security threat which can hide malware from conventional security tools. So how do they do this, and what can you do about them?
Patrik Runald Mar 9 2005 10:52AM Security
How to stay open and secure

How to stay open and secure

It’s a maxim that applies as much to network security as it does to protecting physical assets because there are many ways for a determined individual to penetrate a perimeter defense. Some threats like the Sobig virus instantly threatened networks through email attachments while T-Mobile’s customer data was hacked over a period of many months as reported in SC Magazine here.
Graham Welch Mar 7 2005 11:31AM Security
Zero day attacks

Zero day attacks

Zero Day attacks sound like an invention of science fiction, but the threat of damage from a previously unidentified – and therefore unprotected-against – risk to IT systems is becoming increasingly concerning for organizations.
Ian Schenkel Mar 2 2005 3:26PM Security
Perimeter security – The best option for SMEs?

Perimeter security – The best option for SMEs?

Internet threats have historically been classified as real threats from hackers and virus writers, and then the second order issue of time wasting caused by non-business internet browsing and by having to deal with spam.
Bob Jones Feb 28 2005 12:59PM Security
Can we trust our workforce?

Can we trust our workforce?

Traditionally, one of the most important assets of any successful company is its workforce. Competitive edge comes from employing hard-working, law-abiding motivated individuals with a strong company loyalty. Even for the odd employee, with a grudge against the company, the combination of laws and contracts in the past acted as sufficient deterrent to any wrong-doing.
Petri Säkkinen Feb 23 2005 4:55PM Security
Why good business is also good security

Why good business is also good security

February is a big month for SC Magazine this year. We'll be having our SC Magazine Awards ceremony and dinner for the first time in the U.S. on February 16 during the RSA Conference at San Francisco's Moscone Center. It is, by far, the biggest and swankiest event by which excellence in all things IT security is acknowledged.
Illena Armstrong Feb 22 2005 5:36PM Security
Fly the flag for Britain – in an international way

Fly the flag for Britain – in an international way

Without wishing to wave the Union Jack too vigorously, I couldn't help feeling a slight wave of pride at the achievements of the Jericho Forum, which is celebrating its first year of life.
Ron Condon Feb 22 2005 5:28PM Security
Getronics launches security centre following accord with Counterpane

Getronics launches security centre following accord with Counterpane

IT services company Getronics has launched its Network and Security Centre, from which it will offer managed security services, following a deal with US network security services company Counterpane.
Staff Writers Feb 22 2005 5:04PM Security
CMA needs teeth so that it can bite email fraudsters

CMA needs teeth so that it can bite email fraudsters

As we well know, the provenance of an email message can't be trusted. Sadly, the general internet-hooked public had only been made aware of this recently, as a result of two developments.
Robert Schifreen Feb 22 2005 5:00PM Security
We are standing on the shoulders of unsung giants

We are standing on the shoulders of unsung giants

The computer industry, like many others, has a number of 'celebrities' who are often thought of as its backbone. In reality, there is usually a much larger group of less well-known, or more often unheard of, people who contribute as much, if not more, to the industry's success than the popular press would have us believe.
Nick Barron Feb 22 2005 4:40PM Security
Embryonic infosec institute seeks funds in mission to raise standards

Embryonic infosec institute seeks funds in mission to raise standards

A professional institute for information security is beginning to take shape with the backing of high-profile users and academics.
Staff Writers Feb 22 2005 4:36PM Security
Instant messaging set to double in next 12 months

Instant messaging set to double in next 12 months

Leading companies in Europe anticipate an explosion in the use of instant messaging over the next year, but admit that the technology can be a security nightmare.
Ron Condon Feb 22 2005 3:07PM Security
Aon uses Postini for mail security

Aon uses Postini for mail security

Risk management and reinsurance giant Aon is deploying mail encryption across its UK operation, using email security service provider Postini to switch on TLS (Transport Layer Security) encryption at its mail gateways.
Staff Writers Feb 22 2005 3:02PM Security
Application compatibility may slow Firefox growth

Application compatibility may slow Firefox growth

The increasingly popular Firefox browser could stumble in its bid to make inroads into the corporate environment, despite its many plaudits for increased security and user-friendliness.
René Millman Feb 22 2005 3:01PM Security
Phishers move into pharming

Phishers move into pharming

The next generation of phishing attacks will redirect users to bogus websites when they try to visit legitimate sites, email security firm MX Logic warned.
Staff Writers Feb 22 2005 2:56PM Security
MS AntiSpyware set for enterprise functionality

MS AntiSpyware set for enterprise functionality

Microsoft could build enterprise functionality into its nascent anti-spyware software as early as the second half of this year.
John Sterlicchi Feb 22 2005 2:54PM Security
Keeping email as a service, not as a security hole

Keeping email as a service, not as a security hole

Email may make communication easier, but it is open to a variety of security and productivity issues.
Michael Patterson Feb 22 2005 2:51PM Security
Firms realize that playing it safe is the riskier option

Firms realize that playing it safe is the riskier option

Nobody wants to be the first to try any new or innovative tool, product or technique. You know the old saw: "Never buy version 1.0 of a product."
Peter Stephenson Feb 22 2005 2:42PM Security
T-Mobile USA emphasizes security as details of 2003 breach emerge

T-Mobile USA emphasizes security as details of 2003 breach emerge

T-Mobile USA says it has made security a top priority after it emerged that a hacker had broken into the company's internal systems and viewed customer details.
Staff Writers Feb 22 2005 2:27PM Security
Visa and MasterCard act to align data protection

Visa and MasterCard act to align data protection

Visa and MasterCard International have aligned their separate programs for protecting cardholder data into a single standard for the payment card industry, streamlining what some say was a confusing situation for merchants.
Marcia Savage Feb 22 2005 2:20PM Security

Log In

  |  Forgot your password?