and

Image of Death exploit alive and spreading

Image of Death exploit alive and spreading

Security experts have discovered a toolkit designed to exploit the recently disclosed Microsoft Exploit-MS04-028, popularly dubbed the "Image of Death".
Robert Jaques Sep 27 2004 12:29PM Security
Danish telco clamps down on spam, viruses and malware

Danish telco clamps down on spam, viruses and malware

Danish telecommunications company TDC has successfully completed deployment of a security system at its network edge designed to protect subscribers from spam, viruses and other malicious attacks.
Robert Jaques Sep 24 2004 9:45AM Security
F5 Networks and Radware cookie lawsuit crumbles

F5 Networks and Radware cookie lawsuit crumbles

F5 Networks and Radware have reached agreement to settle a patent dispute concerning alleged breaches of F5 Networks' US Patent No. 6,473,802 entitled, Method and System for Storing Load Balancing Information with a HTTP Cookie.
Robert Jaques Sep 21 2004 1:53PM Security
TruSecure and Betrusted merge

TruSecure and Betrusted merge

TruSecure Corp and Betrusted Inc are merging to form a new firm, Cybertrust.
Jon Tullett Sep 21 2004 10:57AM Security
Viruses and sophisticated spam dominate net

Viruses and sophisticated spam dominate net

The Netsky virus still accounted for most email-borne infection in August despite the May arrest of its suspected author, security software firm Clearswift has said.
Ty Pendlebury Sep 21 2004 12:00AM Telco/ISP
Kodak closes manufacturing plant and processing lab

Kodak closes manufacturing plant and processing lab

The increasing popularity of digital photography has forced Kodak to close its manufacturing plant and wholesale processing lab in Coburg, Victoria, resulting in the redundancy of 600 staff.
Staff Writers Sep 16 2004 12:00AM Software
New internet enables better bandwidth and security

New internet enables better bandwidth and security

The next internet will be 'self-aware' and dynamically responsive to security threats and global network issues, according to Intel.
Ty Pendlebury Sep 13 2004 12:00AM Software
Geeks and technology scare Aussies: survey

Geeks and technology scare Aussies: survey

IT professionals believe the average Australian employee is apprehensive of new technology, according to a recent survey.
Sarah Cooper Sep 8 2004 12:00AM Oddware
MessageLabs and Symantec team up against spam

MessageLabs and Symantec team up against spam

MessageLabs plans to incorporate Symantec's Brightmail Anti-Spam technology into its managed anti-spam service.
Marcia Savage Sep 1 2004 5:59PM Security
ISS and Cisco fight for IDS/IPS market crown

ISS and Cisco fight for IDS/IPS market crown

ISS and Cisco are leading a bitter battle to dominate the fast-growing global market for intrusion detection systems (IDS) and intrusion prevention systems (IPS).
Robert Jaques Sep 1 2004 5:31PM Security
Citec hits sourcing sweet spot with school and mining deals

Citec hits sourcing sweet spot with school and mining deals

Queensland service provider Citec has won two more managed services deals in a series of contracts and renewals expected to spur its previously flat revenues into steady growth.
Fleur Doidge Aug 31 2004 12:00AM Networking
Modular user management and provisioning

Modular user management and provisioning

Identity management solutions are comprised of several critical components: directory services, access management services, authentication services, and user management and provisioning services.
Jeff Schultz Aug 25 2004 10:28AM Security
Porn and pills -- spammer's favourites

Porn and pills -- spammer's favourites

Pornographic spam has increased by almost 350 percent since June, according to statistics released by a content security firm.
DVD Editor Aug 16 2004 12:00AM Security
Harveys, ACCC kiss and make up

Harveys, ACCC kiss and make up

Harvey Norman has promised to continually review its trade practices compliance program following action by the ACCC dating back to 2002 which alleged the big retailer mislead consumers during a pre-GST advertising campaign for accounting software.
Byron Connolly Aug 11 2004 12:00AM Strategy
Divide and rule is the new way of working

Divide and rule is the new way of working

In a connected world, companies need to supplement the security perimeter with other technologies and techniques. Jonathan Gossels and Dick Mackey suggest that zoning could make a significant difference
Jonathan Gossels Aug 5 2004 2:37PM Security
Panasonic debuts Viera line of LCD and plasma TVs

Panasonic debuts Viera line of LCD and plasma TVs

Panasonic is aiming high end with its new range of High Definition plasma and LCD monitors, code-named Viera.
Sarah Stokely Aug 4 2004 12:00AM Hardware
Nitro Data Systems and Systems Engineering sell IPS

Nitro Data Systems and Systems Engineering sell IPS

Intrusion prevention firm Nitro Data Systems has partnered with Systems Engineering to sell network security solutions.
Dan Ilett Aug 3 2004 4:36PM Security
To London and beyond

To London and beyond

The Madrid train bombs have raised fears that it is only a matter of when – rather than if – there will be a serious terrorist incident elsewhere. For my own part, I honestly believe that one will happen within two years – and that it will have a massive impact on how business continuity (BC) and disaster recovery (DR) is viewed in this country.
Neil Stephenson Aug 3 2004 10:51AM Security
Chips with everything - the benefits of chip and PIN

Chips with everything - the benefits of chip and PIN

Chip and PIN is on the minds of IT managers looking for EMV certification, finance directors seeking protection from credit card fraud, and store managers wanting to speed up the transaction process to reduce queuing times.
Staff Writers Aug 3 2004 10:35AM Security
Phishing, spam and end-user awareness top IT pros' concerns

Phishing, spam and end-user awareness top IT pros' concerns

Electronic message management company Sendmail, Inc. Monday released the results of a June poll it conducted of 120 IT professionals, which showed that about 40 percent have decided to roll out some form of sender authentication technology to stop spam and increase productivity.
Illena Armstrong Aug 2 2004 9:38PM Security

Log In

  |  Forgot your password?