within

Advertisers could locate IP addresses to within 100m

Advertisers could locate IP addresses to within 100m

Computer scientist touts method that drastically improves geolocation without user consent.
Apr 11 2011 8:55AM
Google: Plug critical holes within 60 days

Google: Plug critical holes within 60 days

Responsible disclosure a "two-way street".
Jul 22 2010 2:24PM
100GbE customer surge predicted within two years

100GbE customer surge predicted within two years

100 Gigabit Ethernet technologies will outship OC-768 in just two years with growth driven largely by customers rather than carriers, according to Freesky Research.
Jan 6 2009 12:17PM
Intel predicts AI within forty years

Intel predicts AI within forty years

Intel’s chief technology officer has predicted that humans will create computers smarter than themselves within the next forty years.
Aug 22 2008 3:11PM
UK electronic passports cloned within minutes

UK electronic passports cloned within minutes

An investigation by the Times has shown that the supposedly secure electronic passports used by the UK government can be cracked and cloned in minutes.
Aug 7 2008 2:20PM
Microsoft plans Vista Service Pack 1, XP Service Pack 3 releases for first quarter 2008; betas due within weeks

Microsoft plans Vista Service Pack 1, XP Service Pack 3 releases for first quarter 2008; betas due within weeks

Microsoft is planning to release Service Pack 1 (SP1) for its Vista operating system in the first quarter of 2008, and its beta will be available within a month.
Aug 31 2007 10:23AM
Security pros should target the enemy within

Security pros should target the enemy within

Beware of remote workers, urges Cisco.
Oct 11 2006 9:59AM
Symantec to release Norton Confidential within months

Symantec to release Norton Confidential within months

In an effort to combat deteriorating consumer confidence in online transactions, Symantec this week announced anti-fraud solution Norton Confidential will be released this fall.
Jun 27 2006 10:22PM
E-crime experts warn of ‘enemy within’

E-crime experts warn of ‘enemy within’

A new survey revealed today that almost half of global e-crime experts believe the biggest threat to organizations’ data comes from “the enemy within," rather than external hackers.
Apr 27 2006 1:05PM
U.K. firms suffer from the enemy within

U.K. firms suffer from the enemy within

Staff misuse of the internet is the second largest cause of reported security incidents for large U.K. companies.
Mar 28 2006 9:36AM
Firms face growing IT security danger from 'enemy within'

Firms face growing IT security danger from 'enemy within'

Global organizations are leaving themselves vulnerable to significant security risks because of widespread failure to take steps against internal threats, industry experts warned today.
Dec 1 2005 11:53AM
ISPs leave themselves open to 'enemy within'

ISPs leave themselves open to 'enemy within'

Up to 12 percent of all scanning attacks targeting broadband service providers networks are launched internally, from their own subscribers, newly published research has claimed.
Oct 10 2005 11:58AM
In-house, within budget

In-house, within budget

We all love a bargain, so Don Parker advises how to make big savings in your network security training budget
Apr 5 2004 4:57PM
The spy within: So who can you trust?

The spy within: So who can you trust?

Technology can only go so far in protecting company secrets. As Nick Booth discovers, people are the most vulnerable resource
Jan 22 2004 11:26AM
Security Tools within the Common Criteria Framework: Part 2

Security Tools within the Common Criteria Framework: Part 2

This is the second part of a two-part article. The first part discussed security tools used to protect data integrity and the related business processes within an organization: (www.scmagazine.com/scmagazine/sc-online/2002/article/48/article.html).
Jan 15 2004 9:56AM
Security Tools within the Common Criteria framework

Security Tools within the Common Criteria framework

This is the first part of a two-part article. The second part will discuss specific topics in more detail, including specific system and network security tools such as network port scanners, OS detection, configuration tools and vulnerability assessment.
Jan 14 2004 4:58PM
How do you stop the threat from within?

How do you stop the threat from within?

The biggest threat to security is not from outside, it is from the company employee. Julie Jervis asked security experts throughout the U.S. how they are educating these end-users
Jan 13 2004 5:15PM

Log In

Username / Email:
Password:
  |  Forgot your password?