within

Advertisers could locate IP addresses to within 100m

Advertisers could locate IP addresses to within 100m

Computer scientist touts method that drastically improves geolocation without user consent.
Stewart Mitchell Apr 11 2011 8:55AM Security
Google: Plug critical holes within 60 days

Google: Plug critical holes within 60 days

Responsible disclosure a "two-way street".
Dan Kaplan Jul 22 2010 2:24PM Security
100GbE customer surge predicted within two years

100GbE customer surge predicted within two years

100 Gigabit Ethernet technologies will outship OC-768 in just two years with growth driven largely by customers rather than carriers, according to Freesky Research.
Staff Writers Jan 6 2009 12:17PM Telco/ISP
Intel predicts AI within forty years

Intel predicts AI within forty years

Intel’s chief technology officer has predicted that humans will create computers smarter than themselves within the next forty years.
Iain Thomson Aug 22 2008 3:11PM Hardware
UK electronic passports cloned within minutes

UK electronic passports cloned within minutes

An investigation by the Times has shown that the supposedly secure electronic passports used by the UK government can be cracked and cloned in minutes.
Iain Thomson Aug 7 2008 2:20PM Security
Microsoft plans Vista Service Pack 1, XP Service Pack 3 releases for first quarter 2008; betas due within weeks

Microsoft plans Vista Service Pack 1, XP Service Pack 3 releases for first quarter 2008; betas due within weeks

Microsoft is planning to release Service Pack 1 (SP1) for its Vista operating system in the first quarter of 2008, and its beta will be available within a month.
Frank Washkuch Aug 31 2007 10:23AM Security
Security pros should target the enemy within

Security pros should target the enemy within

Beware of remote workers, urges Cisco.
Robert Jaques Oct 11 2006 9:59AM Security
Symantec to release Norton Confidential within months

Symantec to release Norton Confidential within months

In an effort to combat deteriorating consumer confidence in online transactions, Symantec this week announced anti-fraud solution Norton Confidential will be released this fall.
Dan Kaplan Jun 27 2006 10:22PM Security
E-crime experts warn of ‘enemy within’

E-crime experts warn of ‘enemy within’

A new survey revealed today that almost half of global e-crime experts believe the biggest threat to organizations’ data comes from “the enemy within," rather than external hackers.
William Eazel Apr 27 2006 1:05PM Security
U.K. firms suffer from the enemy within

U.K. firms suffer from the enemy within

Staff misuse of the internet is the second largest cause of reported security incidents for large U.K. companies.
William Eazel Mar 28 2006 9:36AM Security
Firms face growing IT security danger from 'enemy within'

Firms face growing IT security danger from 'enemy within'

Global organizations are leaving themselves vulnerable to significant security risks because of widespread failure to take steps against internal threats, industry experts warned today.
William Eazel Dec 1 2005 11:53AM Security
ISPs leave themselves open to 'enemy within'

ISPs leave themselves open to 'enemy within'

Up to 12 percent of all scanning attacks targeting broadband service providers networks are launched internally, from their own subscribers, newly published research has claimed.
William Eazel Oct 10 2005 11:58AM Security
In-house, within budget

In-house, within budget

We all love a bargain, so Don Parker advises how to make big savings in your network security training budget
Don Parker Apr 5 2004 4:57PM Security
The spy within: So who can you trust?

The spy within: So who can you trust?

Technology can only go so far in protecting company secrets. As Nick Booth discovers, people are the most vulnerable resource
Nick Booth Jan 22 2004 11:26AM Security
Security Tools within the Common Criteria Framework: Part 2

Security Tools within the Common Criteria Framework: Part 2

This is the second part of a two-part article. The first part discussed security tools used to protect data integrity and the related business processes within an organization: (www.scmagazine.com/scmagazine/sc-online/2002/article/48/article.html).
Fredric Greene Jan 15 2004 9:56AM Security
Security Tools within the Common Criteria framework

Security Tools within the Common Criteria framework

This is the first part of a two-part article. The second part will discuss specific topics in more detail, including specific system and network security tools such as network port scanners, OS detection, configuration tools and vulnerability assessment.
Fredric Greene Jan 14 2004 4:58PM Security
How do you stop the threat from within?

How do you stop the threat from within?

The biggest threat to security is not from outside, it is from the company employee. Julie Jervis asked security experts throughout the U.S. how they are educating these end-users
Julie Jervis Jan 13 2004 5:15PM Security

Log In

  |  Forgot your password?