Features

RSA warns that ID frailty will harm e-commerce

RSA warns that ID frailty will harm e-commerce

Online business can be risky, Jon Tullett reports on RSA’s plans to secure users
Jon Tullett Dec 6 2004 4:00PM Security
Hackers start to feel long arm of law

Hackers start to feel long arm of law

Global collaboration is paying off. David Quainton reports on the legal success
David Quainton Dec 6 2004 3:44PM Security
Call for government to take a stronger stance

Call for government to take a stronger stance

Jon Tullett Dec 6 2004 12:56PM Security
Developers need to wake up to customer needs

Developers need to wake up to customer needs

Peter Stephenson Dec 6 2004 12:32PM Security
Prosecutions accelerate as new laws start to bite

Prosecutions accelerate as new laws start to bite

David Quainton Dec 6 2004 12:25PM Security
USAF IT standardization will boost protection

USAF IT standardization will boost protection

Marcia Savage Dec 6 2004 12:02PM Security
Implications of first HIPAA court case

Implications of first HIPAA court case

With the first successful prosecution under HIPAA, will there now be a greater crackdown on ID theft? John Sterlicchi reports
John Sterlicchi Dec 3 2004 4:58PM Security
Can you trust poachers who turn gamekeeper?

Can you trust poachers who turn gamekeeper?

David Quainton reports on two firms that are taking the risk of having a virus writer on their staff
David Quainton Dec 3 2004 4:28PM Security
A busy year ahead on the legal front

A busy year ahead on the legal front

Are you worried about the new laws affecting business? You should be. David Quainton gets the lowdown from lawyer Bruce Potter
David Quainton Dec 3 2004 2:33PM Security
United we stand: Combined approach beats threats

United we stand: Combined approach beats threats

Co-operation between states is turning the tables on the cybercriminals. William Pelgrin tells Marcia Savage how the process works
Marcia Savage Dec 3 2004 11:24AM Security
Control what you let in

Control what you let in

Neglecting to watch what you allow into your network can create unnecessary threats, says Lance Braunstein
Lance Braunstein Dec 2 2004 5:31PM Security
New gadgets, new rules

New gadgets, new rules

The growth of mobile messaging devices means firms need to update usage policies, advises Gunter Ollmann
Gunter Ollmann Dec 2 2004 5:12PM Security
How time flies: A round up of the year's cyber events

How time flies: A round up of the year's cyber events

Worms, phishing, patching holes… sound all too familiar? Ben Rothke takes a look back at the big threats that hit the industry in 2004
Ben Rothke Dec 2 2004 12:22PM Security
Know your facts ... it’s all in the research

Know your facts ... it’s all in the research

Gerhard Eschelbeck realized that understanding a threat makes it easier to combat. We asked him to explain his four Laws of Vulnerabilities
Gerhard Eschelbeck Dec 2 2004 12:06PM Security
Review: Wi-Foo: The Secrets of Wireless Hacking

Review: Wi-Foo: The Secrets of Wireless Hacking

Despite the names (Konstantin Gavrilenko, Andrei Mikhailovsky, Andrew Vladimirov), the three people who wrote this book are based in the UK and are the founders of an IT security company there by the name of Arhout. They have decided to impart gems of knowledge to us about wireless networks and how to kept hackers out. Or alternatively if you possess a degree of moral flexibility, you could use this book to learn about hacking into said networks.

René Millman Dec 2 2004 12:00AM Security
Ethical hacking: Think like the bad guys

Ethical hacking: Think like the bad guys

Fancy learning the black art of hacking? Marcia Savage speaks to Jill Davis about a course that helps you to understand your enemies
Marcia Savage Dec 1 2004 5:25PM Security
From detection to prevention

From detection to prevention

2005 may be the year of the IPS tools, but not before they address persistent problems, says Andre Yee
Andre Yee Dec 1 2004 3:19PM Security
Let’s sue everybody! (or "why file sharing is not illegal")

Let’s sue everybody! (or "why file sharing is not illegal")

Imagine Xerox getting sued for creating machines that allow people to photocopy back issues of Time Magazine. Or Kodak getting sued for selling film that could take pictures of a Picasso painting. Perhaps Maxell should be sued for selling blank videotapes that could store copies of any movie starring Pauly Shore. (Well, perhaps some lawsuits can be justified after all.)
Wallace Wang Dec 1 2004 10:38AM Security
Building a secure future for telecoms

Building a secure future for telecoms

Security is fast becoming one of the telecoms’ industry’s ‘hot topics’. This reached a new peak in October when the TeleManagement Forum committed to adding a new security layer to the architecture of NGOSS (New Generation Operation Support Systems). But how has this come about? What’s changed so dramatically? And what issues do the new proposals address?
Dr. Prem Dec 1 2004 10:38AM Security
Understanding common wireless LAN attacks

Understanding common wireless LAN attacks

There is little doubt the enterprise Wireless LAN (WLAN) market is booming. Worldwide WLAN hardware revenue is expected to top $3.7bn USD in 2007 (Infonetics), with over 50% of enterprises deploying WLANs by 2006 (Meta Group).
Brian Mansfield Dec 1 2004 10:38AM Security

Log In

  |  Forgot your password?