Features

Honeypot Project finds decline in Linux attacks

Honeypot Project finds decline in Linux attacks

Unpatched Linux systems are lasting longer on the internet before being compromised, according to a study by the Honeynet Project, a nonprofit group of security professionals that researches online attackers' methods and motives.
Marcia Savage Feb 22 2005 2:04PM Security
Mobile virus developer denies doing any harm

Mobile virus developer denies doing any harm

David Quainton reports on the Brazilian virus writer responsible for Lasco
David Quainton Feb 22 2005 1:15PM Security
Vendors line up to see Jericho vision

Vendors line up to see Jericho vision

The user forum prepares to unveil its ambitions for the future.
Ron Condon Feb 22 2005 1:05PM Security
Institute is in with a fighting chance

Institute is in with a fighting chance

The industry is rallying behind a new professional body, finds David Quainton
David Quainton Feb 22 2005 12:52PM Security
Exodus from DHS gains momentum

Exodus from DHS gains momentum

The exodus from the U.S. Department of Homeland Security (DHS) has continued with two more senior officials leaving.
Barbara Gengler Feb 22 2005 12:46PM Security
Vernier supports Microsoft

Vernier supports Microsoft

Staff Writers Feb 22 2005 12:36PM Security
Lucid and NCS strike OEM deal

Lucid and NCS strike OEM deal

Staff Writers Feb 22 2005 12:34PM Security
Intellitactics teams with Merlin

Intellitactics teams with Merlin

Staff Writers Feb 22 2005 12:31PM Security
How to delve into the hacker’s mind

How to delve into the hacker’s mind

The first person to hold a PhD in forensics, Emlyn Everitt tells David Quainton that the battle for security begins in the boardroom
David Quainton Feb 22 2005 12:24PM Security
How to cut patchwork… and save a cool $100m

How to cut patchwork… and save a cool $100m

The Air Force was spending more on system patches than on software. Something had to change, as John Gilligan tells Marcia Savage .
Marcia Savage Feb 22 2005 11:56AM Security
It’s good to talk security

It’s good to talk security

Who is responsible for your infosec? Jaime Chanaga suggests you start a dialog with your vendors to find out
Jaime Chanaga Feb 22 2005 11:36AM Security
We must learn to love compliance

We must learn to love compliance

Fear of legal action is driving companies to comply with new legislation, but there are positive benefits, too, as David Quainton discovers
David Quainton Feb 22 2005 11:11AM Security
Paper over online cracks

Paper over online cracks

Online authentication security is vital, but much of it can be carried out in a paper review, says Gunter Ollmann
Gunter Ollmann Feb 21 2005 5:32PM Security
So, friend or foe? ID management and access control

So, friend or foe? ID management and access control

Companies need to rationalize their access policies if they are to comply with the new regulations, as Charles Hayhoe explains
Charles Hayhoe Feb 21 2005 5:14PM Security
The changing face of spam

The changing face of spam

Junk email clogging up your inbox used to be annoying, but as René Millman reports, it’s moved beyond that and become a lot more sinister
René Millman Feb 21 2005 5:02PM Security
Can the phishing war be won?

Can the phishing war be won?

Phishing is now an accepted fact of life for many Internet users. Most of the emails that they receive are clearly from friends or business contacts, or clearly fraudulent. But there are a few, just a few, that might just be genuine, and there will always be a small percentage of users who will follow the link sent them in the email, and connect to what they think is their bank, and give the phishers their reward.
Dr Jonathan Feb 21 2005 12:41PM Security
Between friends: Don’t extend trust too far

Between friends: Don’t extend trust too far

Outsourcing opens you to a wealth of network security risks, warn Benny Jones and Dorian Deane. Vigilance is the key to overcoming them
Benny Jones Feb 18 2005 5:10PM Security
Stop that fraud: Fingerprints will secure Texan systems

Stop that fraud: Fingerprints will secure Texan systems

A pilot system to beat Medicaid fraud is showing good results in the state of Texas.

John Sterlicchi Feb 18 2005 4:22PM Security
In from the field: Complying with remote access rules

In from the field: Complying with remote access rules

The agricultural supplier turned to ActivCard to bring its remote access procedures into line with new federal rules.

Marcia Savage Feb 18 2005 4:04PM Security
Fit for anything: Gold’s Gym updates its infrastructure

Fit for anything: Gold’s Gym updates its infrastructure

When the best-of-breed solutions proved too costly, the gym brand turned to Fortinet.
John Sterlicchi Feb 18 2005 3:31PM Security

Log In

  |  Forgot your password?