by

SCO hit by hacker protest

SCO hit by hacker protest

A hacker by the name of realloc() has defaced the SCO web site in an apparent protest over the ongoing legal proceedings the company is waging against Linux.
René Millman Nov 29 2004 2:29PM Security
Internet Explorer slated by Finnish authority

Internet Explorer slated by Finnish authority

The Finnish Communications Regulatory Authority (Ficora) has created confusion by sending out mixed messages about Internet Explorer.
David Quainton Nov 25 2004 2:18PM Security
Spate of new legislation is not welcomed by all

Spate of new legislation is not welcomed by all

David Quainton Nov 12 2004 5:19PM Security
DOE hit by 199 intrusions in 2003

DOE hit by 199 intrusions in 2003

Staff Writers Nov 12 2004 5:06PM Security
SANS Top 20 haunted by problems of the past

SANS Top 20 haunted by problems of the past

David Quainton Nov 12 2004 5:02PM Security
Spam King dethroned by US court

Spam King dethroned by US court

A US District judge has imposed a temporary restraining order against so-called "Spam King" Stanford Wallace and his companies SmartBot and Seismic Entertainment Productions.
Robert Jaques Oct 28 2004 2:11PM Security
IP telephony take up dogged by security woes

IP telephony take up dogged by security woes

Security concerns are holding back the takeup in IP telephony as it is considered another gateway into the corporate network for hackers.
René Millman Oct 9 2004 11:05AM Security
Texas schools cut spam by half with appliance-based system

Texas schools cut spam by half with appliance-based system

After receiving "numerous complaints" about spam, the Spring Independent School District has cut spam volumes by half after rolling out an appliance-based solution.
Robert Jaques Oct 6 2004 9:55AM Security
Wireless broadband use to multiply by five

Wireless broadband use to multiply by five

Latest IDC figures have tipped wireless broadband use to grow five times faster than the total broadband market, exploding from 25,000 users to 287,000 users by 2008.
Staff Writers Sep 21 2004 12:00AM Telco/ISP
Software flaws will triple downtime by 2008

Software flaws will triple downtime by 2008

Organisations that do not include security as a criterion when building or buying software will see system downtime caused by security vulnerabilities treble from 5 per cent to 15 per cent of downtime in 2008, industry experts have warned.
Rob Jaques Sep 15 2004 9:59AM Security
Users duped by stolen ID scam

Users duped by stolen ID scam

A new scam deceives users by falsely stating their identity has been stolen, directing the recipient to a trojan-unleashing website, ACT Policing have warned.
Staff Writers Sep 3 2004 12:00AM Security
IP telephony deployed by 2007

IP telephony deployed by 2007

Medium and large companies plan to deploy IP Telephony within three years, according to a recent survey.
Staff Writers Aug 30 2004 12:00AM Networking
Crypto world rocked by potential flaws

Crypto world rocked by potential flaws

Reports from the Crypto 2004 conference have demonstrated potential attacks against MD5 and SHA hashing algorithms.
Jon Tullett Aug 19 2004 5:42PM Security
Enterprises challenged by mobility: IDC

Enterprises challenged by mobility: IDC

CIOs and IT directors need to better accommodate the deep penetration of personal mobile devices within their organisations, according to an industry analyst.
DVD Editor Aug 16 2004 12:00AM Telco/ISP
Google downed by worm

Google downed by worm

Popular web search engine Google was taken offline by a worm this week.
Jon Tullett Jul 30 2004 10:27AM Security
Half retail supply chain may get RFID tagged by 2005: study

Half retail supply chain may get RFID tagged by 2005: study

Fleur Doidge Jul 9 2004 12:00AM Telco/ISP
Why are people ignoring the danger posed by blended threats?

Why are people ignoring the danger posed by blended threats?

Cisco’s recent announcement that it will incorporate Trend Micro virus and worm technologies with its intrusion-detection system software used on its routers and switches, is excellent news for anyone concerned with IT security. With the rise of more sophisticated attacks – blended threats - a more proactive approach to security is not just necessary, but vital. This is an approach we've been taking for two years now, so it’s always pleasing to see Cisco validating our market by adopting it in such a way.
Bruce Hendrix Jun 21 2004 4:40PM Security
Korean government hit by Trojan

Korean government hit by Trojan

Hackers have penetrated computer defences of South Korea’s state agencies using a Trojan horse sent through China.
Dan Ilett Jun 21 2004 12:56PM Security
One-third of PCs infected by spyware

One-third of PCs infected by spyware

One third of PCs could be infected by spyware.
Dan Ilett Jun 17 2004 11:13AM Security
Virus alerts increase by 600 per cent

Virus alerts increase by 600 per cent

A war of insults between worm writers has caused virus alerts to rise by more than 600 per cent.
Dan Ilett Apr 5 2004 2:37PM Security

Log In

  |  Forgot your password?