and

On colleagues and support

On colleagues and support

We all have colleagues with whom we keep in touch. We all have colleagues who we call on from time to time for help when we run into knotty problems. And we all have organizations we turn to when we need specific advice. The trouble is that many of us do not mix those three groups to the benefit of our systems’ security, and we should.
Peter Stephenson,CeRNS, May 10 2006 8:05PM Security
Internode signs $2.2M SA govt contract

Internode signs $2.2M SA govt contract

The South Australian Government has signed Internode to continue providing Internet access for the State's 70,000 public servants for the next three years.
Lilia Guan May 10 2006 10:28AM Telco/ISP
Handle risk better and reap the rewards

Handle risk better and reap the rewards

It’s been a busy month. By the time you read this, three highlights of the infosec year will have passed in quick succession: Infosecurity Europe, Jericho Forum’s annual conference and, of course, the SC Magazine Awards, Europe 2006. If you weren’t there on the night, the full list of winners and finalists is enclosed with this issue in the commemorative book of the night. Congratulations to all those who went home with one of the coveted gongs.
Paul Fisher May 9 2006 4:23PM Security
U.S.: China and Russia offer poor trade protection

U.S.: China and Russia offer poor trade protection

The Office of the U.S. Trade Representative identified governments around the world that need to take stronger action against piracy and counterfeiting with the release last week of its “Special 301” annual report.
Ericka Chickowski May 3 2006 9:58PM Security
U.K. governments and industry tackle online abuse

U.K. governments and industry tackle online abuse

New guidance to protect children using chatrooms and search engines was published yesterday by the U.K. Home Office, which is also preparing to launch a new Child Exploitation and Online Protection Centre (CEOP).
William Eazel Apr 25 2006 9:30AM Security
Holographic breakthrough boosts data encryption and storage

Holographic breakthrough boosts data encryption and storage

Japanese scientists have predicted a bright future for holographic data encryption and storage, promising that holographic technology could be developed to allow massive amounts of encrypted data to be accessed at very high speeds.
William Eazel Apr 18 2006 10:33AM Security
Me and my job

Me and my job

What do you like about your job?
Nancy Edwards Apr 14 2006 8:14PM Security
Review: FortiGate-300A and FortiAnalyzer-100A

Review: FortiGate-300A and FortiAnalyzer-100A

This unit is an appliance and is very complex from the moment you take it out of the box and plug it in.
Peter Stephenson,CeRNS, Apr 14 2006 12:00AM Security
New PoC malware can infect both Windows and Linux

New PoC malware can infect both Windows and Linux

Kaspersky Lab today reported a new proof-of-concept (PoC) cross-platform virus that creates malicious code to infect both Linux and Microsoft Windows operating systems.
Frank Washkuch Apr 7 2006 6:04PM Security
New PoC virus can infect both Windows and Linux

New PoC virus can infect both Windows and Linux

Kaspersky Lab today reported a new proof of concept (PoC) cross-platform virus that creates malicious code to infect both Linux and Microsoft Windows operating systems.
Frank Washkuch Apr 7 2006 6:02PM Security
Postini: Spam and IM attacks up, mail viruses down

Postini: Spam and IM attacks up, mail viruses down

Spam and instant messaging (IM) attacks increased in March, while the number of viruses declined, according to message management provider Postini.
Dan Kaplan Apr 6 2006 7:21PM Security
Watchdog names and shames 'badware' vendors

Watchdog names and shames 'badware' vendors

The Stopbadware Coalition, which takes aim at malware, spyware and adware, published its first report naming the programs it believes computer users should avoid installing.
René Millman Mar 23 2006 12:38PM Security
Now up and running: XP on a Mac

Now up and running: XP on a Mac

Two hackers have some more spending money in their pockets after figuring out how to run Microsoft’s Windows XP operating system on an Intel Mac.
Frank Washkuch Mar 17 2006 10:14PM Security
Israeli court to jail husband and wife trojan team

Israeli court to jail husband and wife trojan team

A married couple is to be jailed for developing and selling an industrial espionage spyware trojan that helped private investigators spy on their clients' competitors.
William Eazel Mar 15 2006 11:04AM Security
From Russia, bots and personal information for sale

From Russia, bots and personal information for sale

Russian hackers are offering stolen credit card and bank account numbers, as well as the use of thousands of bot computers, for a low price.
Frank Washkuch Mar 9 2006 9:07PM Security
Naming and shaming

Naming and shaming

One important thing that distinguishes the US from Europe in the world of IT security is the requirement to disclose breaches.
Ron Condon Mar 8 2006 4:51PM Security
Jobs market: Me and my job

Jobs market: Me and my job

How did you get into security? I got into security eight years ago. Before that I switched between platform and network administration after a few years of application development. Now security has become a daily routine.
Staff Writers Mar 7 2006 6:58PM Security
Husband and wife trojan team indicted

Husband and wife trojan team indicted

Two Israeli individuals alleged to have developed an industrial espionage trojan that helped companies spy on their competitors were indicted this weekend in the Tel Aviv District Court for a series of computer crimes.
William Eazel Mar 7 2006 10:02AM Security
Policies and ethical standards

Policies and ethical standards

As the workplace environment continues to become more complex, there is an increased potential for unethical and inappropriate behavior by employees at all levels of the organization.
Joe Malec Mar 6 2006 10:17PM Security
Risks and rewards of a wireless LAN

Risks and rewards of a wireless LAN

Wireless local area network (WLAN) technology was deployed at Mount Allison University to enhance on-the-go productivity of our students, faculty, staff and administrators. Whether it’s conducting research, exchanging ideas or gaining access to useful operational information, campus users can now perform such functions in real-time without breaking stride from their daily routines.
Peter Crawshaw Mar 6 2006 6:54PM Security

Log In

  |  Forgot your password?