an

InStat declares an end to gadget wars

InStat declares an end to gadget wars

New content, not hardware, drivng portable device sales.
Feb 26 2007 7:55AM
Ringing in the new year with an email worm

Ringing in the new year with an email worm

Be careful who you accept New Year's wishes from. Security researchers today are warning of new, mass-spammed email worm containing a "Happy New Year" subject heading that few security programs protect against.
Dec 29 2006 5:27PM
Vista Launch: New OS an opportunity for niche security firms

Vista Launch: New OS an opportunity for niche security firms

While most major security vendors worked out the kinks in their Windows Vista-compatible offerings this week, some niche vendors were taking advantage of the corporate launch to unveil new security solutions.
Dec 4 2006 9:20AM
Data theft not an issue for managers

Data theft not an issue for managers

Small to medium sized businesses (SMEs) are failing to acknowledge and prevent data theft, new research shows.
Nov 22 2006 9:20AM
Microsoft patent pledge an 'empty promise'

Microsoft patent pledge an 'empty promise'

Guarantee to open source developers dismissed as 'meaningless'.
Nov 14 2006 9:45AM
Opinion: Don't be an accidental vandal

Opinion: Don't be an accidental vandal

In 2005, the operator of one of the top-level Network Time Protocol (NTP) time servers in Denmark noticed that a large volume of requests hitting his server were invalid.
Aug 14 2006 2:44PM
Opinion: Don't be an accidental vandal

Opinion: Don't be an accidental vandal

In 2005, the operator of one of the top-level Network Time Protocol (NTP) time servers in Denmark noticed that a large volume of requests hitting his server were invalid.
Aug 14 2006 2:44PM
Update: Vulnerabilities - An exploit a day turns people away from
Internet Explorer

Update: Vulnerabilities - An exploit a day turns people away from Internet Explorer

31 - H D Moore, the man behind the Metasploit toolkit, an open-source tool for developing, testing and using exploit code, published a bug-a-day log for the month of July. All the bugs have been found in Microsoft's Internet Explorer browser. Moore said in his blog that he decided to embark on this mission "to create awareness about the types of bugs that plague modern browsers and to demonstrate the techniques used to discover them".
Aug 14 2006 2:44PM
Update: Vulnerabilities - An exploit a day turns people away from
Internet Explorer

Update: Vulnerabilities - An exploit a day turns people away from Internet Explorer

31 - H D Moore, the man behind the Metasploit toolkit, an open-source tool for developing, testing and using exploit code, published a bug-a-day log for the month of July. All the bugs have been found in Microsoft's Internet Explorer browser. Moore said in his blog that he decided to embark on this mission "to create awareness about the types of bugs that plague modern browsers and to demonstrate the techniques used to discover them".
Aug 14 2006 2:44PM
Update: Vulnerabilities - An exploit a day turns people away from
Internet Explorer

Update: Vulnerabilities - An exploit a day turns people away from Internet Explorer

31 - H D Moore, the man behind the Metasploit toolkit, an open-source tool for developing, testing and using exploit code, published a bug-a-day log for the month of July. All the bugs have been found in Microsoft's Internet Explorer browser. Moore said in his blog that he decided to embark on this mission "to create awareness about the types of bugs that plague modern browsers and to demonstrate the techniques used to discover them".
Aug 14 2006 2:44PM
Update: Vulnerabilities - An exploit a day turns people away from
Internet Explorer

Update: Vulnerabilities - An exploit a day turns people away from Internet Explorer

31 - H D Moore, the man behind the Metasploit toolkit, an open-source tool for developing, testing and using exploit code, published a bug-a-day log for the month of July. All the bugs have been found in Microsoft's Internet Explorer browser. Moore said in his blog that he decided to embark on this mission "to create awareness about the types of bugs that plague modern browsers and to demonstrate the techniques used to discover them".
Aug 14 2006 2:44PM
Update: Vulnerabilities - An exploit a day turns people away from
Internet Explorer

Update: Vulnerabilities - An exploit a day turns people away from Internet Explorer

31 - H D Moore, the man behind the Metasploit toolkit, an open-source tool for developing, testing and using exploit code, published a bug-a-day log for the month of July. All the bugs have been found in Microsoft's Internet Explorer browser. Moore said in his blog that he decided to embark on this mission "to create awareness about the types of bugs that plague modern browsers and to demonstrate the techniques used to discover them".
Aug 14 2006 2:44PM
An inescapable evolution

An inescapable evolution

A few years ago, the notion of carrying around a phone with communicator-like capabilities would have sounded far-fetched. Yet, the arrival of dual-mode phones and wireless LAN phone systems is rapidly changing our ideas about mobility.
Aug 7 2006 8:45PM
Victoria's (malicious) secret: fake lingere an information-stealing trojan

Victoria's (malicious) secret: fake lingere an information-stealing trojan

Security firm Sophos today warned about a spyware trojan that uses a picture slideshow of a Russian beauty as a front while it steals personal information from an unsuspecting user.
Jul 28 2006 6:31PM
Vista's security features lack polish, but still an improvement

Vista's security features lack polish, but still an improvement

Though Microsoft has made drastic security improvements within its upcoming Vista operating system, there will be some usability hiccups within its new security features and plenty of room for security developers to sell aftermarket products, the Yankee Group said this week.
May 11 2006 8:26AM
An integrated approach

An integrated approach

SC Magazine is providing an exclusive look at abridged versions of various chapters included in the just-released Larstan’s The Black Book on Government Security, as part of an agreement with Larstan Publishing.
May 10 2006 8:00PM
Revealing your identity...for an Easter egg

Revealing your identity...for an Easter egg

Research carried out this Easter outside Victoria Station in London has found that 81 percent of people were willing to part with all the personal information needed to steal their identity for the chance to win an Easter egg.
Apr 24 2006 10:12AM
Avoiding an identity crisis

Avoiding an identity crisis

ID management is fast becoming essential to business, but deployment needs careful planning. René Millman reports
Apr 5 2006 4:48PM
An eventful - but secure - Olympics

An eventful - but secure - Olympics

Bode Miller may have flopped on the slopes, but the Olympics’ IT security staff succeeded all the way to the finish at the recently concluded Winter Games.
Mar 23 2006 10:46PM
Debate: Defence in depth is turning out to be nothing more than an expensive failure

Debate: Defence in depth is turning out to be nothing more than an expensive failure

Feb 13 2006 10:10AM

Log In

Username / Email:
Password:
  |  Forgot your password?