an

InStat declares an end to gadget wars

InStat declares an end to gadget wars

New content, not hardware, drivng portable device sales.
Shaun Nichols Feb 26 2007 7:55AM Hardware
Ringing in the new year with an email worm

Ringing in the new year with an email worm

Be careful who you accept New Year's wishes from. Security researchers today are warning of new, mass-spammed email worm containing a "Happy New Year" subject heading that few security programs protect against.
Dan Kaplan Dec 29 2006 5:27PM Security
Vista Launch: New OS an opportunity for niche security firms

Vista Launch: New OS an opportunity for niche security firms

While most major security vendors worked out the kinks in their Windows Vista-compatible offerings this week, some niche vendors were taking advantage of the corporate launch to unveil new security solutions.
Ericka Chickowski Dec 4 2006 9:20AM Security
Data theft not an issue for managers

Data theft not an issue for managers

Small to medium sized businesses (SMEs) are failing to acknowledge and prevent data theft, new research shows.
Fiona Raisbeck Nov 22 2006 9:20AM Security
Microsoft patent pledge an 'empty promise'

Microsoft patent pledge an 'empty promise'

Guarantee to open source developers dismissed as 'meaningless'.
Tom Sanders Nov 14 2006 9:45AM Software
Opinion: Don't be an accidental vandal

Opinion: Don't be an accidental vandal

In 2005, the operator of one of the top-level Network Time Protocol (NTP) time servers in Denmark noticed that a large volume of requests hitting his server were invalid.
Nick Barron, Aug 14 2006 2:44PM Security
Opinion: Don't be an accidental vandal

Opinion: Don't be an accidental vandal

In 2005, the operator of one of the top-level Network Time Protocol (NTP) time servers in Denmark noticed that a large volume of requests hitting his server were invalid.
Nick Barron, Aug 14 2006 2:44PM Security
Update: Vulnerabilities - An exploit a day turns people away from
Internet Explorer

Update: Vulnerabilities - An exploit a day turns people away from Internet Explorer

31 - H D Moore, the man behind the Metasploit toolkit, an open-source tool for developing, testing and using exploit code, published a bug-a-day log for the month of July. All the bugs have been found in Microsoft's Internet Explorer browser. Moore said in his blog that he decided to embark on this mission "to create awareness about the types of bugs that plague modern browsers and to demonstrate the techniques used to discover them".
Staff Writers Aug 14 2006 2:44PM Security
Update: Vulnerabilities - An exploit a day turns people away from
Internet Explorer

Update: Vulnerabilities - An exploit a day turns people away from Internet Explorer

31 - H D Moore, the man behind the Metasploit toolkit, an open-source tool for developing, testing and using exploit code, published a bug-a-day log for the month of July. All the bugs have been found in Microsoft's Internet Explorer browser. Moore said in his blog that he decided to embark on this mission "to create awareness about the types of bugs that plague modern browsers and to demonstrate the techniques used to discover them".
Staff Writers Aug 14 2006 2:44PM Security
Update: Vulnerabilities - An exploit a day turns people away from
Internet Explorer

Update: Vulnerabilities - An exploit a day turns people away from Internet Explorer

31 - H D Moore, the man behind the Metasploit toolkit, an open-source tool for developing, testing and using exploit code, published a bug-a-day log for the month of July. All the bugs have been found in Microsoft's Internet Explorer browser. Moore said in his blog that he decided to embark on this mission "to create awareness about the types of bugs that plague modern browsers and to demonstrate the techniques used to discover them".
Staff Writers Aug 14 2006 2:44PM Security
Update: Vulnerabilities - An exploit a day turns people away from
Internet Explorer

Update: Vulnerabilities - An exploit a day turns people away from Internet Explorer

31 - H D Moore, the man behind the Metasploit toolkit, an open-source tool for developing, testing and using exploit code, published a bug-a-day log for the month of July. All the bugs have been found in Microsoft's Internet Explorer browser. Moore said in his blog that he decided to embark on this mission "to create awareness about the types of bugs that plague modern browsers and to demonstrate the techniques used to discover them".
Staff Writers Aug 14 2006 2:44PM Security
Update: Vulnerabilities - An exploit a day turns people away from
Internet Explorer

Update: Vulnerabilities - An exploit a day turns people away from Internet Explorer

31 - H D Moore, the man behind the Metasploit toolkit, an open-source tool for developing, testing and using exploit code, published a bug-a-day log for the month of July. All the bugs have been found in Microsoft's Internet Explorer browser. Moore said in his blog that he decided to embark on this mission "to create awareness about the types of bugs that plague modern browsers and to demonstrate the techniques used to discover them".
Staff Writers Aug 14 2006 2:44PM Security
An inescapable evolution

An inescapable evolution

A few years ago, the notion of carrying around a phone with communicator-like capabilities would have sounded far-fetched. Yet, the arrival of dual-mode phones and wireless LAN phone systems is rapidly changing our ideas about mobility.
Luc Roy, Aug 7 2006 8:45PM Security
Victoria's (malicious) secret: fake lingere an information-stealing trojan

Victoria's (malicious) secret: fake lingere an information-stealing trojan

Security firm Sophos today warned about a spyware trojan that uses a picture slideshow of a Russian beauty as a front while it steals personal information from an unsuspecting user.
Dan Kaplan Jul 28 2006 6:31PM Security
Vista's security features lack polish, but still an improvement

Vista's security features lack polish, but still an improvement

Though Microsoft has made drastic security improvements within its upcoming Vista operating system, there will be some usability hiccups within its new security features and plenty of room for security developers to sell aftermarket products, the Yankee Group said this week.
Ericka Chickowski May 11 2006 8:26AM Security
An integrated approach

An integrated approach

SC Magazine is providing an exclusive look at abridged versions of various chapters included in the just-released Larstan’s The Black Book on Government Security, as part of an agreement with Larstan Publishing.
Doron Cohen May 10 2006 8:00PM Security
Revealing your identity...for an Easter egg

Revealing your identity...for an Easter egg

Research carried out this Easter outside Victoria Station in London has found that 81 percent of people were willing to part with all the personal information needed to steal their identity for the chance to win an Easter egg.
William Eazel Apr 24 2006 10:12AM Security
Avoiding an identity crisis

Avoiding an identity crisis

ID management is fast becoming essential to business, but deployment needs careful planning. René Millman reports
René Millman Apr 5 2006 4:48PM Security
An eventful - but secure - Olympics

An eventful - but secure - Olympics

Bode Miller may have flopped on the slopes, but the Olympics’ IT security staff succeeded all the way to the finish at the recently concluded Winter Games.
Dan Kaplan Mar 23 2006 10:46PM Security
Debate: Defence in depth is turning out to be nothing more than an expensive failure

Debate: Defence in depth is turning out to be nothing more than an expensive failure

Abe Kleinfeld Feb 13 2006 10:10AM Security

Log In

  |  Forgot your password?