that

Pretexting - white lies that can damage your company

Pretexting - white lies that can damage your company

In the wake of recent news at HP, pretexting has become the hot topic in the business world, and its sudden rise to fame broaches numerous questions including: What exactly is pretexting? How are companies liable for it? What are companies doing that is considered pretexting and how can they protect themselves from becoming the next HP?
Matt Leonard, Feb 19 2007 9:21AM Security
Microsoft tells Symantec that latest exploited Word flaw is variation of older vulnerability

Microsoft tells Symantec that latest exploited Word flaw is variation of older vulnerability

Microsoft has confirmed that what appeared to be a newly discovered Word flaw is actually a variant of a vulnerability revealed last year, according to Symantec.
Frank Washkuch Feb 2 2007 6:26PM Security
Web boffins offer to name that tune

Web boffins offer to name that tune

Sing, hum or whistle to start music search.
Matt Chapman Feb 2 2007 9:49AM Oddware
Survey: SCMagazine.com - the website that information security professionals recommend

Survey: SCMagazine.com - the website that information security professionals recommend

More than 80 percent of IT security professionals who visit SCMagazine.com would recommend the site to their colleagues, while another 61 percent agree that the information they find on the site helps them to do their jobs better, according to a December reader survey conducted by Harvey Research on SC Magazine's behalf.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Jan 26 2007 2:33PM Security
Hackers unleash worm that targets VoIP

Hackers unleash worm that targets VoIP

Hackers have released a worm that attacks Skype, the voice over IP (VoIP) application, security experts warn.
Fiona Raisbeck Dec 20 2006 11:06AM Security
Hacker crew that attacked NASA websites arrested in Chile

Hacker crew that attacked NASA websites arrested in Chile

Four men - part of what authorities have called one of the world's most successful hacking gangs - have been arrested in Chile.
Frank Washkuch Nov 8 2006 6:15PM Security
Security experts warn that hackers are exploiting IE bug

Security experts warn that hackers are exploiting IE bug

Security experts have warned internet users to take care when surfing the web, following sightings of malware planted on websites that exploits a recently discovered Internet Explorer security vulnerability that has not yet been patched by Microsoft.
William Eazel Dec 5 2005 2:42PM Security
Noticed that big grey thing over there?

Noticed that big grey thing over there?

The latest Global Security Survey from Deloitte Touche Tohmatsu underlines what many of us had conveniently forgotten – that most of the threats to our systems come from inside the organisation.
Ron Condon Jul 1 2005 4:31PM Security
Sticking plaster that won’t stick

Sticking plaster that won’t stick

Why has HIPAA failed to achieve the same level of success as SoX, asks Ben Rothke
Ben Rothke May 12 2005 12:11PM Security
Debate: Everyone knows Linux is the safest OS, and there’s no way that Windows can compete

Debate: Everyone knows Linux is the safest OS, and there’s no way that Windows can compete

Any time one compares Linux and Windows security one risks unleashing a cataract of opinion.
Richard Ford Apr 19 2005 12:42PM Security
CMA needs teeth so that it can bite email fraudsters

CMA needs teeth so that it can bite email fraudsters

As we well know, the provenance of an email message can't be trusted. Sadly, the general internet-hooked public had only been made aware of this recently, as a result of two developments.
Robert Schifreen Feb 22 2005 5:00PM Security
Firms realize that playing it safe is the riskier option

Firms realize that playing it safe is the riskier option

Nobody wants to be the first to try any new or innovative tool, product or technique. You know the old saw: "Never buy version 1.0 of a product."
Peter Stephenson Feb 22 2005 2:42PM Security
Stop that fraud: Fingerprints will secure Texan systems

Stop that fraud: Fingerprints will secure Texan systems

A pilot system to beat Medicaid fraud is showing good results in the state of Texas.

John Sterlicchi Feb 18 2005 4:22PM Security
RSA warns that ID frailty will harm e-commerce

RSA warns that ID frailty will harm e-commerce

Online business can be risky, Jon Tullett reports on RSA’s plans to secure users
Jon Tullett Dec 6 2004 4:00PM Security
Clean up that infection

Clean up that infection

Implementing a strategy early is the key to protecting your network from spyware and adware, says Kirk Drake
Kirk Drake Nov 12 2004 5:15PM Security
Find that nugget of relevant data

Find that nugget of relevant data

Management tools can help you make sense of your logs to pick out real events from the crowd. By John Sterlicchi
John Sterlicchi Jun 29 2004 12:26PM Security
Would you like broadband with that?

Would you like broadband with that?

Telstra will activate wireless hotspots in 44 MacDonald’s outlets across Australia, offering users wireless broadband access starting today.
Nirmal Chandrasena Feb 20 2004 12:00AM Telco/ISP
SECURITY CAMERA: Storage, Where's the SANs in That?

SECURITY CAMERA: Storage, Where's the SANs in That?

Maybe it's the current global climate that has made many aware of the need for better storage, backup and disaster recovery capabilities.
Jayne Parkhouse Jan 16 2004 2:55PM Security
Authentication - Was That Really You Who Just Logged In?

Authentication - Was That Really You Who Just Logged In?

For this month’s article, I felt a need to address one of my most frequent concerns - authentication.
Jack Wiles Jan 16 2004 1:08PM Security
Where In the World Did I Put That File?

Where In the World Did I Put That File?

As I get older each minute, my short-term memory doesn't seem to remember a lot about yesterday, much less last month.
Jack Wiles Jan 15 2004 2:14PM Security

Log In

  |  Forgot your password?