or

Voting machine flaw: threat or not?

Voting machine flaw: threat or not?

An election watchdog group issued a security alert on Thursday claiming Diebold touch-screen voting machines - widely deployed in a number of states to replace traditional paper ballots - are susceptible to hacker attacks that could "incurably compromise" the terminals.
Dan Kaplan May 12 2006 9:57PM Security
Spyware kits for sale - £10 or $17

Spyware kits for sale - £10 or $17

A Russian website has appeared on the internet selling spyware kits for ten pounds.
René Millman Mar 24 2006 1:29PM Security
Is your SAN or NAS an Achilles heel?

Is your SAN or NAS an Achilles heel?

IT security has long been the focus of corporate attention, while storage security has been — perhaps unnoticeably — absent from the limelight. So it perhaps comes as a surprise to find that the data held in storage environments is frequently left vulnerable, simply because security in this area is so often overlooked.
James Middleton Dec 15 2005 10:36PM Security
Management right or wrong?

Management right or wrong?

Nick Barron Dec 9 2005 4:51PM Security
Google storm over Sea of Japan (or is it East Sea?)

Google storm over Sea of Japan (or is it East Sea?)

Korean and Japanese hacking groups have targeted each other again in an argument over the name of a stretch of water.
David Quainton Aug 22 2005 11:16AM Security
Mobile workforce - security nightmare or opportunity?

Mobile workforce - security nightmare or opportunity?

Over the last decade blackberries, mobile phones, laptops, PDAs and a variety of other devices have become intrinsic to both our working and personal lives. It is impossible to imagine a life without them. Consumers and businesses alike have seen the advantages of real time communication and have embraced the technology that allows them to do more whilst on the move.
Dave Taylor Aug 3 2005 12:02PM Security
Google down – hijacking or human error?

Google down – hijacking or human error?

Google refuted rumors it was hacked on Sunday, following a 15 minute downtime.
Melissa Loveday May 10 2005 12:29PM Security
So, friend or foe? ID management and access control

So, friend or foe? ID management and access control

Companies need to rationalize their access policies if they are to comply with the new regulations, as Charles Hayhoe explains
Charles Hayhoe Feb 21 2005 5:14PM Security
Flash drives - friend or foe?

Flash drives - friend or foe?

Easy-to use flash USB drives are increasingly popular, but could cause serious security breaches.
Chris Minchin Jan 11 2005 5:02PM Security
Your passwords can either break you or save you

Your passwords can either break you or save you

Calum Macleod Jan 11 2005 11:10AM Security
Let’s sue everybody! (or "why file sharing is not illegal")

Let’s sue everybody! (or "why file sharing is not illegal")

Imagine Xerox getting sued for creating machines that allow people to photocopy back issues of Time Magazine. Or Kodak getting sued for selling film that could take pictures of a Picasso painting. Perhaps Maxell should be sued for selling blank videotapes that could store copies of any movie starring Pauly Shore. (Well, perhaps some lawsuits can be justified after all.)
Wallace Wang Dec 1 2004 10:38AM Security
Back-up or pack-up?

Back-up or pack-up?

Data is the lifeblood of the organisation and any incidents, which stop access or result in a loss of critical data can have serious consequences for the business in terms of day-to-day operations and financial loss. This emphasises the ongoing need for back-up and recovery processes to be in place to minimise the effects of unplanned downtime and ensure the continuity of business processes. Paul Butler, principal consultant at Altiris, warns of the implications of not having sufficient processes in place to deal with the loss of business critical systems and data.
Paul Butler Oct 27 2004 3:27PM Security
Manhunt or witchhunt?

Manhunt or witchhunt?

Manhunt was released on the 28 November 2003 to critical acclaim but barely a whisper about the violent nature of its content.
blank blank , John Gillooly Sep 30 2004 12:00AM Software
IPSec or SSL? Another option

IPSec or SSL? Another option

Since their advent, IPSec Virtual Private Networks (VPNs) have revolutionized the way remote workers and business partners connect to a business by establishing a secure tunnel between a remote worker or business partner and the organization they are connecting to.
Barry Phillips Sep 1 2004 10:16AM Security
Web anti-virus – deplorable or deployable?

Web anti-virus – deplorable or deployable?

The internet plays a prevailing role in today’s workplace, and its use continues to grow - from personal web-based email, to the growing popularity of public instant messaging (IM). Despite the benefits the web provides for employees, including convenience and accessibility, its use has opened a back door for viruses to bypass existing email anti-virus security measures and infect the network.
Nigel Hawthorn Aug 31 2004 5:19PM Security
Crackdown on internet crime leads to 150 arrests or convictions

Crackdown on internet crime leads to 150 arrests or convictions

The Department of Justice Thursday said an investigation this summer into online fraud and crime has led to more than 150 arrests or convictions nationwide.
Marcia Savage Aug 27 2004 4:06AM Security
Friend or foe? Show your ID, please!

Friend or foe? Show your ID, please!

What began as a communication tool for the academic community is now rated as the most critical form of business communication.
Steve Ronksley Aug 3 2004 11:04AM Security
Open source. Love it or hate it, but can you trust it?

Open source. Love it or hate it, but can you trust it?

Open source software (OSS) is firmly entrenched in the infrastructure of the Internet, and is now making inroads into the security market too. But although the darling of techies everywhere, OSS has its doubters. In particular, many corporate managers have concerns about support, accountability, and longevity.
Jon Tullett Jul 28 2004 11:15AM Security
The open network, or an open door to prosecution?

The open network, or an open door to prosecution?

The last decade has seen organizations of all types and sizes investing huge sums in establishing sophisticated computer networks, aimed at enabling employees to better meet customers’ needs and create a competitive edge.
Glenn Stephens Jul 27 2004 5:51PM Security
Global sourcing -- short-circuit or shot in the arm for Aussie IT?

Global sourcing -- short-circuit or shot in the arm for Aussie IT?

Gartner India slammed claims by a local recruitment firm that outsourcing offshore would strip IT jobs from Australia.
Claire Doble Jul 8 2004 12:00AM Strategy

Log In

  |  Forgot your password?