or

Security budgets stable or increasing at financial firms

Security budgets stable or increasing at financial firms

Compliance and insider threats drive growth.
Jun 21 2010 11:47AM
Spam and viruses see minor rises in May: Symantec

Spam and viruses see minor rises in May: Symantec

All but one spam emails now contain a URL.
May 27 2010 2:04PM
One in three workers would steal data to help a friend

One in three workers would steal data to help a friend

Global economic downturn increases desperation.
Nov 24 2009 10:16AM
Hot or not: ActiveX vulnerabilities

Hot or not: ActiveX vulnerabilities

ActiveX vulnerabilities have posed a security challenge for some time, and they're likely to be a challenge for quite some time to come.
Sep 18 2009 12:37PM
Will Silverlight shine or is the web too Flash?

Will Silverlight shine or is the web too Flash?

Can Microsoft compete with Adobe?
Sep 7 2009 1:16PM
Hot or not: Software update vulnerabilities

Hot or not: Software update vulnerabilities

The automatic update features in many software applications are proving to be vulnerable to attack. Hackers are taking notice. You should, too.
Nov 20 2008 1:56PM
Hot or Not: Virtualisation Security

Hot or Not: Virtualisation Security

What are the potential security implications of virtualisation? The answer is: they are considerable.
Apr 8 2008 3:21AM
Fortinet CEO: innovate or die

Fortinet CEO: innovate or die

Ken Xie, the CEO and founder of UTM specialist Fortinet said that IT security companies must focus on innovation and engineering
Apr 8 2008 1:20AM
Legal matters: To delete or not to delete?

Legal matters: To delete or not to delete?

Some emails are important written records you might one day have to rely on in court, says Tamzin Matthew.
Mar 26 2008 3:16PM
Hot or Not: Vista SP1 Scheduled For Widespread Release

Hot or Not: Vista SP1 Scheduled For Widespread Release

It's been some time in the making, but Microsoft soon will make its first service pack for Vista widely available. While the final version started shipping to manufacturers earlier this month, Microsoft says it's making some final tweaks to its distribution channels before general availability in a few weeks. So what can we expect?
Mar 12 2008 3:48PM
Quantum computers: technological deliverance or the end of security?

Quantum computers: technological deliverance or the end of security?

Quantum computing might spell the end of today's computer and credit card encryption technology, a U.S. physicist has claimed.
Mar 10 2008 2:21PM
Storm worm botnet: mutating or fading?

Storm worm botnet: mutating or fading?

What is the future of the infamous Storm worm, has it morphed into the Mega-D botnet that is now posing a threat or shrunk out of sight?
Feb 28 2008 11:32AM
An odd couple or a perfect match?

An odd couple or a perfect match?

Industry experts have voiced a wide range of opinions on the potential acquisition of web search and online marketing firm Yahoo by Microsoft.
Feb 27 2008 2:10PM
One in seven dumped via text message or email

One in seven dumped via text message or email

Following in the tradition of Phil Collins, who reputedly divorced his wife using a fax machine, today’s generation are using technology to end their romances..
Dec 17 2007 2:45PM
Hot or not: The Forum of Incident Response and Security Teams (FIRST) unveils updated common vulnerability scoring system

Hot or not: The Forum of Incident Response and Security Teams (FIRST) unveils updated common vulnerability scoring system

The new scoring system promises to make it easier for security managers and the IT industry to better measure the real-world risks associated with software flaws.
Sep 11 2007 3:03PM
UTM or flexible security platform?

UTM or flexible security platform?

The unified threat management bucket is starting to show signs of age.
Aug 3 2007 7:59AM
Sydney's Museum of Contemporary Art hacked?

Sydney's Museum of Contemporary Art hacked?

SYDNEY - Security experts are mum on claims by Search engine Google that Sydney’s Museum of Contemporary Art website contains malicious ‘badware’.
Jun 13 2007 3:50PM
Google says MCA's site is bad

Google says MCA's site is bad

Security experts are mum on claims by search engine Google that Sydney’s Museum of Contemporary Art Website contains malicious ‘badware’.
Jun 13 2007 3:48PM
Hot or not: Local buffer overflow vulnerabilities

Hot or not: Local buffer overflow vulnerabilities

Buffer overflows have long been a primary vector of attack against computer systems — and the rise of local buffer overflow vulnerabilities and zero-day attacks makes it a problem that's likely to grow more troublesome.
May 29 2007 9:58AM
Sentencing of teacher in 'porn or spyware' case postponed

Sentencing of teacher in 'porn or spyware' case postponed

The sentencing of Julie Amero, the Connecticut substitute teacher convicted of exposing seventh-grade students to pornographic images — pictures that she and a number of security experts contend were spyware-produced — was postponed to 6 June.
May 21 2007 3:40AM

Log In

Username / Email:
Password:
  |  Forgot your password?