of

U.C. Berkeley laptop with personal data of 98,000 stolen

U.C. Berkeley laptop with personal data of 98,000 stolen

Police at the University of California at Berkeley are investigating the theft of a laptop that contained names and Social Security numbers of more than 98,000 graduate students and applicants.
Marcia Savage Mar 29 2005 9:26PM Security
China is full of phish

China is full of phish

Chinese phishing websites have rocketed in the last year, with 223 reported in 2004 according to a new report.
David Quainton Mar 29 2005 11:19AM Security
Rising number of phishers are turning to pharming

Rising number of phishers are turning to pharming

Phishers increasingly are relying on more advanced methods to steal personal information.
Illena Armstrong Mar 28 2005 11:17PM Security
Banks advised to notify customers of data breaches

Banks advised to notify customers of data breaches

The Federal Reserve Board has issued guidance that calls on financial institutions to notify customers of security breaches involving their sensitive data.
Marcia Savage Mar 25 2005 5:30PM Security
IE 'unsafe' for 98 per cent of 2004 claims new report

IE 'unsafe' for 98 per cent of 2004 claims new report

Microsoft’s Internet Explorer was open to attack through known vulnerabilities for 98 per cent of 2004 according to findings from a security company.
René Millman Mar 23 2005 1:20PM Security
World of Warcraft reaches 1.5 million subscribers

World of Warcraft reaches 1.5 million subscribers

World of Warcraft, the online role-playing game from Blizzard Entertainment, has reached 1.5 million subscribers worldwide.
Staff Writers Mar 22 2005 1:54PM Software
Take control of your security

Take control of your security

Let's face it, managing security policies can give you a headache. Coping with the rules and properties and policies affecting hundreds of devices - firewalls, intrusion prevention systems, and anti-virus servers - is hard enough, and that's before trying to manage them, or change their state.
Amit Tailor Mar 21 2005 3:18PM Security
Changing facts of web crime must be faced

Changing facts of web crime must be faced

The internet's no longer dominated by script kiddies looking for bragging rights. So said experts at both the recent RSA Conference in California and the Cyber Security Summit in Florida. Today's attackers want money, not an underground following.
Illena Armstrong Mar 17 2005 3:12PM Security
Jericho finally sets out vision of open networks

Jericho finally sets out vision of open networks

IT security pressure group the Jericho Forum has finally published the white paper outlining its vision for open, secure networks.
René Millman Mar 17 2005 2:46PM Security
RSA strides out of safe zone to secure future

RSA strides out of safe zone to secure future

RSA launched a consumer service offering and an appliance at its San Francisco annual conference late February, strategic steps analysts said were bold but necessary.
Jon Tullett Mar 17 2005 12:34PM Security
Intelligent surveillance - the death of random review?

Intelligent surveillance - the death of random review?

Every financial institution today is at the mercy of constantly changing regulations. Each new mis-selling or market abuse scandal brings with it a tightening of the rules: whether it is a major shift like the introduction of the Sarbanes-Oxley Act and the Basel II Accord, or the cumulative effect of successive administrations and regulatory regimes adding new sections and clauses to existing regulations.
Bo Manning Mar 16 2005 10:21AM Security
Botnets used as tool for range of attacks

Botnets used as tool for range of attacks

Botnets, networks of compromised computers that can be remotely controlled by attackers, are used for many types of attacks, including identity theft, according to a recent report by the researchers at Honeynet Project.
Marcia Savage Mar 15 2005 5:34PM Security
Federal officials eyeing expansion of Air Force-Microsoft initiative

Federal officials eyeing expansion of Air Force-Microsoft initiative

Federal officials are talking about expanding the U.S. Air Force's initiative with Microsoft, which will produce secure standard configurations of Microsoft software, to other government agencies.
Marcia Savage Mar 14 2005 9:45PM Security
Flood of worms breaks on IM shore

Flood of worms breaks on IM shore

Instant messaging (IM) worms are on the rise and here to stay, according to a new report.
David Quainton Mar 11 2005 11:52AM Security
Tighter regulation of data broker industry proposed

Tighter regulation of data broker industry proposed

A bill that would increase federal oversight of information brokers was introduced in Congress Wednesday.
Marcia Savage Mar 11 2005 11:51AM Security
IT sec community has false sense of security

IT sec community has false sense of security

A false sense of security could lead IT managers to getting the sack, a new survey has revealed.
David Quainton Mar 10 2005 4:30PM Security
One third of London wireless networks insecure

One third of London wireless networks insecure

Hackers have a one-in-three chance of finding an unsecured wireless network in the City of London, according to new research.
René Millman Mar 10 2005 4:15PM Security
One third of London wireless networks

One third of London wireless networks

Hackers have a one-in-three chance of finding an unsecured wireless network in the City of London, according to new research.
René Millman Mar 10 2005 4:12PM Security
Virus authors form league of ungentlemanly fiends

Virus authors form league of ungentlemanly fiends

An anti-virus expert is claiming that virus writers are working together, leading to the development of more widespread and dangerous malware.
David Quainton Mar 9 2005 4:27PM Security
The growing menace of rootkits

The growing menace of rootkits

Rootkits are a fast-emerging security threat which can hide malware from conventional security tools. So how do they do this, and what can you do about them?
Patrik Runald Mar 9 2005 10:52AM Security

Log In

  |  Forgot your password?