as

Botnets used as tool for range of attacks

Botnets used as tool for range of attacks

Botnets, networks of compromised computers that can be remotely controlled by attackers, are used for many types of attacks, including identity theft, according to a recent report by the researchers at Honeynet Project.
Marcia Savage Mar 15 2005 5:34PM Security
Phishing on the rise as phishers target smaller fish

Phishing on the rise as phishers target smaller fish

Delivery of phishing emails rose 42 percent in January, as internet criminals attack more companies and compromise more computers worldwide, a new report reveals.
David Quainton Feb 25 2005 12:47PM Security
Keeping email as a service, not as a security hole

Keeping email as a service, not as a security hole

Email may make communication easier, but it is open to a variety of security and productivity issues.
Michael Patterson Feb 22 2005 2:51PM Security
T-Mobile USA emphasizes security as details of 2003 breach emerge

T-Mobile USA emphasizes security as details of 2003 breach emerge

T-Mobile USA says it has made security a top priority after it emerged that a hacker had broken into the company's internal systems and viewed customer details.
Staff Writers Feb 22 2005 2:27PM Security
Spam busters wary as Verizon buys MCI

Spam busters wary as Verizon buys MCI

The anti-spam fraternity has reacted warily to the news of Verizon’s $6.7billion acquisition of MCI. The marriage of the communications giants, finalised today, brings two of the biggest spam-hosting Internet Service Providers (ISPs) together.
David Quainton Feb 14 2005 3:45PM Security
Fiorina quits as HP head

Fiorina quits as HP head

Carly Fiorina, chairman and chief executive of Hewlett-Packard, has resigned.
René Millman Feb 9 2005 2:11PM Security
MCI Worldcom fingered as spam badguy

MCI Worldcom fingered as spam badguy

Telecom giant MCI Worldcom rakes in US$5,000,000 a year from spammers, according to anti-spam service Spamhaus.
David Quainton Feb 8 2005 5:05PM Security
IT managers see spyware as top threat in 2005

IT managers see spyware as top threat in 2005

IT managers believe spyware will be the top threat to network security this year, according to a poll conducted by security supplier WatchGuard Technologies.
Marcia Savage Jan 26 2005 11:15PM Security
Virus poses as CNN newsletter

Virus poses as CNN newsletter

A cunning new worm has been discovered that hides itself as a fake CNN newsletter.
René Millman Jan 21 2005 11:40AM Security
Symantec-Veritas merger seen as sensible

Symantec-Veritas merger seen as sensible

Symantec's $13.5 billion acquisition of Veritas Software makes sense, industry analysts said.
Marcia Savage Dec 16 2004 8:53PM Security
Trojan poses as spam-hating screensaver

Trojan poses as spam-hating screensaver

A trojan posing as Lycos’ “Make Love Not Spam” screensaver is threatening computers, it has been revealed. The news, the latest in the Lycos’ vigilante saga, will come as a further blow to the company after being lambasted by various industry pundits for it’s anti-spam efforts.
David Quainton Dec 6 2004 5:06PM Security
Prosecutions accelerate as new laws start to bite

Prosecutions accelerate as new laws start to bite

David Quainton Dec 6 2004 12:25PM Security
Users see handhelds as powerful tools: survey

Users see handhelds as powerful tools: survey

Handheld users are looking for a range of functionality in their ideal devices, according to a recent survey.
Staff Writers Nov 17 2004 12:00AM Storage
Business as usual for Microsoft Axapta resellers

Business as usual for Microsoft Axapta resellers

Microsoft has no special plans for extra initiatives that may help its partners battle their way to Axapta sales in the heaving seas of an already overcrowded and over-traded ERP market.
Fleur Doidge Nov 8 2004 12:00AM Software
Wireless LANs head for enterprise mainstream as security improves

Wireless LANs head for enterprise mainstream as security improves

Although security fears continue to hold back Wireless local area network (WLAN) deployments, the technology is slowly becoming established as a mainstream enterprise solution, according to industry analysts.
Robert Jaques Nov 5 2004 11:18AM Security
Russian implicated as Sobig virus writer

Russian implicated as Sobig virus writer

The author of the Sobig virus has allegedly been unmasked. An anonymous document placed on the internet links it to a Russian named Ibragimov. The document indicates the Russian, or perhaps an associate from his company Send-Safe, is behind the virus.
David Quainton Nov 4 2004 11:53AM Security
Telecommuters condemned as weakest link in security chain

Telecommuters condemned as weakest link in security chain

A quarter of IT mangers fear that remote workers present the biggest challenge to security in their organisations, according to newly published research.
Robert Jaques Oct 26 2004 10:39AM Security
Using events-per-second as a factor in selecting SEM tools

Using events-per-second as a factor in selecting SEM tools

Events Per Second, or EPS, as it is commonly referred to in the world of network security, is a measurement that is used to convey how fast a network generates data from its security devices (firewalls, Intrusion Detection Systems (IDS), servers, routers, etc.), and/or how fast an SEM product can correlate data from those devices. A savvy buyer will match the EPS his network is generating to those that can be accommodated by the SEM tool that he is purchasing.
Roberto Angelino, Oct 19 2004 5:46PM Security
Comindico receivers pledge business as usual

Comindico receivers pledge business as usual

Receivers for wholesale ISP Comindico have announced that the company will continue to operate as usual during the sale process.
Staff Writers Sep 29 2004 12:00AM Telco/ISP
Canon signs up as Australian Equitrac reseller

Canon signs up as Australian Equitrac reseller

Canon Australia has signed up as an official reseller of US document accounting software provider Equitrac.
Fleur Doidge Sep 29 2004 12:00AM Hardware

Log In

  |  Forgot your password?