from

Consultant's view: Internal sender spoofing - Ban mail from

Consultant's view: Internal sender spoofing - Ban mail from

It's easy to make email appear to come from an internal user, warns Ken Munro. So be on the lookout.
Nov 27 2006 9:31AM Security
Top US sites attract most traffic from outside America

Top US sites attract most traffic from outside America

Internet usage outside US growing more rapidly.
Robert Jaques Nov 10 2006 9:48AM Software
Another VA breach affects 1,600 veterans from New York system

Another VA breach affects 1,600 veterans from New York system

The Department of Veterans Affairs (VA) is again warning veterans their identity may be at risk following the theft of an unencrypted laptop from the agency's New York Harbor Healthcare System.
Dan Kaplan Nov 2 2006 5:08PM Security
From InfoSecurity NY: Physical, IT security coming together

From InfoSecurity NY: Physical, IT security coming together

The convergence of physical and IT security within organisations soon will become the norm - not the exception - but key challenges await those businesses and government agencies adopting the new business model, a panel of experts said today at InfoSecurity NY.
Dan Kaplan Oct 25 2006 11:22PM Security
From InfoSecurity NY: Cost of data breaches up nearly a third in past year, study says

From InfoSecurity NY: Cost of data breaches up nearly a third in past year, study says

The cost of data breaches has risen 30 percent over the past year, according to a new Ponemon Institute study released Monday at InfoSecurity NY.
Dan Kaplan Oct 25 2006 3:38PM Security
SurfControl talks down threat from Microsoft

SurfControl talks down threat from Microsoft

SurfControl has claimed that it has nothing to fear from Microsoft Vista and that it is “business as usual” for the filtering company.
Ambrose McNevin Oct 25 2006 8:42AM Security
From InfoSecurity NY: Feds improving in cybercrime fight

From InfoSecurity NY: Feds improving in cybercrime fight

The ability of federal agents to fight cybercrime has improved in the US, despite challenges in recruiting investigators with the necessary skills, Mark Mershon, assistant director-in-charge for the New York office of the FBI, said today while addressing the InfoSecurity New York conference.
Frank Washkuch Oct 24 2006 8:43PM Security
Investors shy away from Web 2.0 start-ups

Investors shy away from Web 2.0 start-ups

No guarantee of big returns.
Tom Sanders Oct 6 2006 10:11AM Software
Silicon Graphics to rise from Chapter 11

Silicon Graphics to rise from Chapter 11

Judge approves financial reorganisation package.
Andrew Charlesworth Sep 25 2006 9:57AM Hardware
From The Security Standard: How financial world will react to FFIEC deadline still uncertain

From The Security Standard: How financial world will react to FFIEC deadline still uncertain

As the Dec. 31 deadline creeps closer for financial organizations to comply with new federal guidelines mandating multi-factor authentication, the jury is still out on how financial institutions will react, said a panel of experts speaking Wednesday at The Security Standard conference in Boston.
Dan Kaplan Sep 7 2006 10:39PM Security
The Month: Online multiplayer games at risk from hackers

The Month: Online multiplayer games at risk from hackers

Online multiplayer games are at increasing risk from hackers, according to a Microsoft security development engineer.
Staff Writers Sep 4 2006 3:56PM Security
Opinion: From the CSO's desk - Think before you hit the send
button

Opinion: From the CSO's desk - Think before you hit the send button

One of the "advantages" of being the head of a security team for a major company is that my email account is an easy first port of call for security product vendors to introduce themselves. Over the past couple of years, I have seen this means of communication grow exponentially.
Paul Dorey, Sep 4 2006 3:56PM Security
Opinion: From the CSO's desk - Think before you hit the send

Opinion: From the CSO's desk - Think before you hit the send

One of the "advantages" of being the head of a security team for a major company is that my email account is an easy first port of call for security product vendors to introduce themselves. Over the past couple of years, I have seen this means of communication grow exponentially.
Paul Dorey, Sep 4 2006 3:56PM Security
Medical marvel created from Xbox

Medical marvel created from Xbox

Modified console shows promise for stroke rehabilitation.
Robert Jaques Sep 1 2006 10:17AM Hardware
US department learns lessons from laptop theft

US department learns lessons from laptop theft

Encryption to protect veterans' data.
Andrew Charlesworth Aug 30 2006 9:55AM Security
Opinion: Protect data from your staff

Opinion: Protect data from your staff

The rise in data security breaches and trade secret piracy over the past year is a wake-up call for executives. And the threat posed internally is just as great as that at the perimeter.
Jason Ashley, Aug 14 2006 2:44PM Security
Opinion: From the CSO's desk - Banks should ask safer questions

Opinion: From the CSO's desk - Banks should ask safer questions

Like most people these days, I change credit cards often to take advantage of zero per-cent interest rates.
Brian Shorten, Aug 14 2006 2:44PM Security
Opinion: Protect data from your staff

Opinion: Protect data from your staff

The rise in data security breaches and trade secret piracy over the past year is a wake-up call for executives. And the threat posed internally is just as great as that at the perimeter.
Jason Ashley, Aug 14 2006 2:44PM Security
Opinion: From the CSO's desk - Banks should ask safer questions

Opinion: From the CSO's desk - Banks should ask safer questions

Like most people these days, I change credit cards often to take advantage of zero per-cent interest rates.
Brian Shorten, Aug 14 2006 2:44PM Security
Update: Vulnerabilities - An exploit a day turns people away from
Internet Explorer

Update: Vulnerabilities - An exploit a day turns people away from Internet Explorer

31 - H D Moore, the man behind the Metasploit toolkit, an open-source tool for developing, testing and using exploit code, published a bug-a-day log for the month of July. All the bugs have been found in Microsoft's Internet Explorer browser. Moore said in his blog that he decided to embark on this mission "to create awareness about the types of bugs that plague modern browsers and to demonstrate the techniques used to discover them".
Staff Writers Aug 14 2006 2:44PM Security

Log In

  |  Forgot your password?