of

Democrats lash out at endorsement of Gates

Democrats lash out at endorsement of Gates

The Australian Democrats have lashed out at John Howard's strong endorsement yesterday of Microsoft and its founder and chairman Bill Gates.
Sarah Stokely Jun 29 2004 12:00AM Software
Microsoft investigating source of internet attack

Microsoft investigating source of internet attack

Microsoft on Saturday said it was working with law enforcement to track down those responsible for an attack that compromised enterprise web sites running unpatched versions of IIS 5.0 (Internet Information Services).
Marcia Savage Jun 28 2004 4:22PM Security
US-CERT warns of compromised web sites

US-CERT warns of compromised web sites

US-CERT said Thursday that it was tracking malicious activity involving compromised web sites running Microsoft's Internet Information Services (IIS) 5.0 and possibly affecting users who visit the sites.
Marcia Savage Jun 25 2004 5:48PM Security
Battle of wills

Battle of wills

SC Magazine asked John Cheney, Matt Sergeant and Alyn Hockey for the methods and dastardly tricks that spammers use to evade spam defenses. Here are some tactics the good guys discovered during the fight
John Cheney, Jun 25 2004 11:53AM Security
Entrust completes acquisition of AmikaNow!

Entrust completes acquisition of AmikaNow!

Identity and access management firm Entrust has completed its purchase of anti-spam and e-mail filtering firm AmikaNow!.
Dan Ilett Jun 23 2004 1:15PM Security
One-third of PCs infected by spyware

One-third of PCs infected by spyware

One third of PCs could be infected by spyware.
Dan Ilett Jun 17 2004 11:13AM Security
Meeting the challenges of securing your business

Meeting the challenges of securing your business

Events in the news during the past few years have taught us all many lessons. However, the primary lesson that all businessmen should have learned, is the need to keep their businesses secure in an ever changing and increasingly malevolent world. From fears about Y2K to the tragic events of September 11, the need for heighten security is readily apparent. Heightened alert is a worldwide status.
Russell Sarder Jun 15 2004 12:21PM Security
In search of a better approach to secure e-mail

In search of a better approach to secure e-mail

The volume of internet traffic generated by an ever-increasing number of applications, including e-mail, Instant Messaging (IM), web services, Voice over IP (VoIP), and other network transactions is growing unabated. Together with these applications has come an associated proliferation in the number of user identities within enterprises – e-mail addresses, IM handles, VoIP telephone numbers, all of which need to be managed. Concurrently, companies are under increasing scrutiny to adhere to government regulations and other compliance requirements to protect the privacy of customers, employees, and their personal data.
Dan Nadir Jun 15 2004 12:13PM Security
Oracle warns of e-business suite flaws

Oracle warns of e-business suite flaws

Oracle has urged customers to apply a patch for newly discovered vulnerabilties in its e-business suite.
Marcia Savage Jun 10 2004 11:06PM Security
Reseller stays mum on settlement of IBM mainframe dispute

Reseller stays mum on settlement of IBM mainframe dispute

Fleur Doidge Jun 9 2004 12:00AM Hardware
META: Security spending to peak at up to 12 percent of IT budgets

META: Security spending to peak at up to 12 percent of IT budgets

The average security investment will peak at eight to 12 per cent of IT budgets in the U.S. by 2006, and in Europe and the Asia Pacific region by 2007, according to report issued Monday by market-research firm META Group.
Marcia Savage Jun 7 2004 11:25PM Security
Department of Homeland Security to pay up to $10bn for biometrics

Department of Homeland Security to pay up to $10bn for biometrics

The Department of Homeland Security is to pay up to $10 billion for biometrics to screen foreigners entering America.
Dan Ilett Jun 3 2004 3:54PM Security
The birth of the PCI-Express age

The birth of the PCI-Express age

COMMENTARY: Ah Computex. Here I am again for another year of the craziest show on earth. It may lack the slickness of shows like E3 and Comdex, but it is an experience like no other.
John Gillooly Jun 3 2004 12:00AM Hardware
Fighting the fees of IT contractor management

Fighting the fees of IT contractor management

A new CMS (Contractor Management Service) launched last week by Melbourne based IT Recruitment firm, VTR Consulting, aims to address one of IT contractors' biggest gripes -- CMS fees.
DVD Editor Jun 1 2004 12:00AM Training & Development
The Issue of Compliance  - It’s Here and It’s Expanding!

The Issue of Compliance - It’s Here and It’s Expanding!

By now, most high-tech conferences have devoted at least one 30-minute session to the topic of Sarbanes-Oxley (aka “Sarbox”).
Melisa LaBancz-Bleasdale May 24 2004 5:43PM Security
Spam soars to more than two-thirds of total traffic

Spam soars to more than two-thirds of total traffic

The level of unsolicited email on the internet continues to rise and topped more than two-thirds of the total internet traffic last month.
Ron Condon May 24 2004 1:02PM Security
More evidence of Cisco code found

More evidence of Cisco code found

The FBI is helping Cisco to examine further evidence of how its source code was distributed.
Dan Ilett May 19 2004 4:07PM Security
The hidden dangers of spam

The hidden dangers of spam

Spam has gone from virtually nothing four years ago to a major problem today. It is now estimated that spam accounts for about 60 per cent of all email carried over the internet, up from 45 per cent this time last year.
Peter Wenham May 19 2004 3:43PM Security
Farmers reap the profit of security

Farmers reap the profit of security

British agricultural supplier Countrywide Farmers is renewing its network security.
Dan Ilett May 18 2004 1:58PM Security
Australian CERT warns of new flaw in wireless protocol

Australian CERT warns of new flaw in wireless protocol

The Australian Computer Emergency Response Team issued an advisory Thursday warning of a flaw in the 802.11 wireless protocol that makes WLANs vulnerable to a denial-of-service attack.
Marcia Savage May 13 2004 10:14PM Security

Log In

  |  Forgot your password?