to

Tumbleweed promotes Scullion to CEO

Tumbleweed promotes Scullion to CEO

Tumbleweed Communications today announced that its board of directors has unanimously named James P. Scullion as its new chief executive officer, effective immediately.
William Eazel Jan 18 2006 10:59AM Security
ID theft: beyond fear to opportunity

ID theft: beyond fear to opportunity

In the last few months, it has become nearly impossible to read a magazine or watch television without coming across a story about identity theft. Identity theft is causing a significant amount of angst among consumers and businesses alike.
Sara Gates Jan 13 2006 7:54PM Security
Got something to say?

Got something to say?

Send your comments, praise or criticisms to scfeedbackus@haymarketmedia.com. We reserve the right to edit letters.
Staff Writers Jan 13 2006 7:29PM Security
Symantec owns up to 'rootkit'

Symantec owns up to 'rootkit'

Symantec went public with its own use of rootkit-like technology this week, offering users a fix and saying the bug posed only a "low" risk.
Frank Washkuch Jan 12 2006 8:44PM Security
Hodges quits McAfee, moves on to Websense

Hodges quits McAfee, moves on to Websense

Gene Hodges took over Monday as the new chief executive officer of Websense after resigning as president of McAfee.
Frank Washkuch Jan 10 2006 9:48PM Security
Court allows university to block spam

Court allows university to block spam

The U.S. Supreme Court ensured on Monday that the football field won’t be the only place blocking will be going on at the University of Texas.
Frank Washkuch Jan 9 2006 8:26PM Security
Sober to strike again this week

Sober to strike again this week

The first worm epidemic of the new year - the latest variant of the Sober worm - is poised to strike at the end of this workweek, security experts have warned.
Frank Washkuch Jan 3 2006 10:10PM Security
WMF flaw to be patched this month

WMF flaw to be patched this month

This month's “patch Tuesday” bulletin from Microsoft will feature a security update for the recently exploited Windows Meta File vulnerability.
Frank Washkuch Jan 3 2006 9:36PM Security
Firm: IM threats to increase next year

Firm: IM threats to increase next year

Cybercriminals will become yet more sophisticated in 2006, discovering new vulnerabilities in instant messaging systems and mobile security, one firm noted in a year-end study.
Frank Washkuch Dec 27 2005 8:32PM Security
$20m software pirate sent to jail

$20m software pirate sent to jail

Nathan Peterson, owner and operator of iBackups, pleaded guilty in a District Court in Alexandria, Va., to two counts of criminal copyright infringement for illegally copying and selling nearly $20 million worth of computer software.
William Eazel Dec 22 2005 11:33AM Security
Santa worm coming to town

Santa worm coming to town

The latest instant messenger threat is one Santa Claus you don’t want visiting.
Frank Washkuch Dec 21 2005 9:52PM Security
Nessus changes force firms to adjust

Nessus changes force firms to adjust

Changes in the licensing agreement for Nessus will force some firms to rethink their security strategies, one security company warned this week.
Frank Washkuch Dec 19 2005 9:12PM Security
New York to consider anti-phishing law

New York to consider anti-phishing law

New York state could soon empower officials to go after online fraudsters using fake emails to bait Empire State residents and businesses.
Frank Washkuch Dec 19 2005 8:57PM Security
Social engineering and other threats to internal security

Social engineering and other threats to internal security

How difficult would it be for a good looking woman dressed in a provocative outfit to gain access to your internal network?
Ari Tammam Dec 16 2005 11:46AM Security
10 steps to safety

10 steps to safety

So your systems have been compromised — a distributed denial of service (DDoS) attack shut your network down or a worm infected dozens of your users’ desktop machines. Now what do you do? Here are 10 steps to help safeguard your systems in the future.
Staff Writers Dec 15 2005 10:24PM Security
Relying on the logs to recover

Relying on the logs to recover

When bad things happen to good networks — and no enterprise is completely immune from attacks on its IT infrastructure anymore — how the good guys fight back can make or break the company’s ability to survive the threat.
Jim Carr Dec 15 2005 10:16PM Security
Got something to say?

Got something to say?

Send your comments, praise or criticisms to scfeedbackus@haymarketmedia.com
Staff Writers Dec 15 2005 9:16PM Security
Getting organized to gain support

Getting organized to gain support

If your days are anything like mine, there is no shortage of people who you must keep apprised of your company’s information security and risk information posture. This list of professionals seems endless — peers, the board of directors, executive managers, internal and external auditors, and a myriad of regulators.
Gene Fredriksen Dec 15 2005 8:59PM Security
Phishers turn to blended attacks to catch more surfers

Phishers turn to blended attacks to catch more surfers

Organized criminal gangs are targeting online consumers with ever more sophisticated blended phishing attacks - some of which even find out details of their interests and use them to generate tailored phishing emails - security experts have warned.
William Eazel Dec 15 2005 11:25AM Security
Spammers and criminals working hard to trick Christmas shoppers

Spammers and criminals working hard to trick Christmas shoppers

Security fears have made 69 percent of shoppers more cautious about purchasing goods online, a newly published survey has claimed.
William Eazel Dec 14 2005 9:47AM Security

Log In

  |  Forgot your password?