in

Debate: IP telephony is insecure and cannot be used in an organisation’s infrastructure just yet

Debate: IP telephony is insecure and cannot be used in an organisation’s infrastructure just yet

Tim Keanini Dec 9 2005 5:21PM Security
More than 10,000 new bots emerge in 2005

More than 10,000 new bots emerge in 2005

Bots have emerged as the most prolific type of malicious code during 2005, according to new research. Data published today by PandaLabs reveals that more than 10,000 new samples of automated worms or trojans were detected during this year alone, leading to a sharp rise in the number of zombie botnets used by cyber criminals.
Wiliiam Eazel Dec 9 2005 1:53PM Security
Sober now one in 13 emails

Sober now one in 13 emails

The latest variant of the Sober worm, called the most widespread virus outbreak ever, has infected one in every 13 email messages, according to a leading online security company.
Frank Washkuch Dec 6 2005 2:54PM Security
'Dr. Chaos' gets seven more years in jail

'Dr. Chaos' gets seven more years in jail

The hacker responsible for a series of Wisconsin power failures five years ago was sentenced to seven more years in federal prison this week.
Frank Washkuch Dec 1 2005 8:20PM Security
Backup encryption failures leave data in peril

Backup encryption failures leave data in peril

Potentially sensitive corporate data is being placed unnecessarily at risk because less than a quarter of companies currently encrypt their backup tapes, newly published research has claimed.
William Eazel Nov 24 2005 10:28AM Security
Cyber gamers vie for world glory in Singapore

Cyber gamers vie for world glory in Singapore

SINGAPORE - More than 700 computer game enthusiasts are gathering in Singapore to take part in the world's biggest competition for computer and video games.
Staff Writers Nov 18 2005 3:29PM Software
Sony caves in, spyware CD exchange offered

Sony caves in, spyware CD exchange offered

The man who first made public Sony-BMG Entertainment’s spyware-like CD-Roms had only one word at the top of his weblog Wednesday: “Victory!”
Frank Washkuch Nov 16 2005 9:11PM Security
New Sober variants in the mail

New Sober variants in the mail

Security vendors warned users on Tuesday about a handful of new variants of the Sober worm that have appeared this week.
Frank Washkuch Nov 15 2005 10:19PM Security
Criminals will take $2.8B out of ecommerce in 2005

Criminals will take $2.8B out of ecommerce in 2005

Dollar losses from ecommerce fraud are rising, with newly published research predicting that cyber fraudsters will steal more than $2.8 billion during 2005, an 8-percent increase over the year before.
William Eazel Nov 15 2005 11:12AM Security
Give us your views in our 2005 survey

Give us your views in our 2005 survey

Ron Condon Nov 10 2005 4:38PM Security
Our man in cyberspace

Our man in cyberspace

Against a backdrop of spooks, geeks and hackers, former NSA man Ira Winkler paints a dark picture of the modern hacker to Ron Condon
Ron Condon Nov 10 2005 3:24PM Security
30 countries struggling in Mitglieder 'avalanche'

30 countries struggling in Mitglieder 'avalanche'

An "avalanche" of Mitglieder Trojans is drowning computers worldwide with security experts warning that over 30 countries are now affected by the different variants of this threat. Four of the five variants (FK, FL, FM and FN) are among the six threats most frequently detected, according to by Panda Software.
William Eazel Nov 9 2005 2:52PM Security
Storage managers in the dark over Continuous Data Protection

Storage managers in the dark over Continuous Data Protection

Although many enterprises are enthusiastic about rolling out continuous data protection (CDP) systems to improve the effectiveness of their data backup services, many do not understand how the technology actually works, according to IDC.
William Eazel Oct 25 2005 10:56AM Security
Microsoft warns of flaw in latest Windows patch

Microsoft warns of flaw in latest Windows patch

Microsoft has issued a warning that flaws in its latest Windows patch designed to protect against newly discovered critical Windows vulnerabilities have been causing “various problems” for an as yet unknown number of users.
William Eazel Oct 19 2005 10:35AM Security
Skills in demand

Skills in demand

This month, Jeff Combs of Alta Associates, Inc., focuses on how interest in risk management is affecting job growth.
Jeff Combs, Oct 10 2005 7:30PM Security
Investing in identity management

Investing in identity management

More efficient management, more productive staff and improved data security; just some of the advantages of Identity Management. On the other hand it can often involve high implementation costs and levels of project complexity. Only consistent ROI calculations can accurately define the benefits of such a solution. While it is relatively easy to establish concrete ROI criteria for the topic of efficiency, it is much more complicated to do so for the topic of security.
Dr. Martin Sep 26 2005 11:37AM Security
More spyware used in identity theft

More spyware used in identity theft

Spyware is increasingly being used by criminals to sniff out user passwords and log keystrokes, according to new research.
René Millman Sep 15 2005 3:12PM Security
Cisco warns of flaw in its software

Cisco warns of flaw in its software

Cisco Systems has issued an alert about a flaw in its Internetwork Operating System (IOS) software that could allow an attacker to launch a denial-of-service or execute remote code on Cisco devices.
Marcia Savage Sep 8 2005 5:24PM Security
IM threats decline but grow in sophistication

IM threats decline but grow in sophistication

Threats to instant-messaging systems dropped 33 percent last month, according to Akonix Systems, a supplier of IM security products.
Marcia Savage Sep 7 2005 11:18PM Security
Our man in cyberspace

Our man in cyberspace

Against a backdrop of spooks, geeks and hackers, former NSA man Ira Winkler paints a dark picture of the modern hacker to Ron Condon
Ron Condon Sep 5 2005 2:45PM Security

Log In

  |  Forgot your password?