Criminal intentions behind half of all attacks; mass-mailing worms on the outs
Forrester pushes personal firewalls, virus writers join forces, Windows rootkits circulate, Symantec sees kid sites awash in adware
Identity theft draws media attention; phishing attacks skyrocket
Automating E-Mail Retention, Industry Forms VoIP Security Alliance
Resistance, then acceptance of automated e-mail retention; reports of spam’s decline premature
Don't forget to secure your VoIP network
A new report examines IPS products in rigid performance, security, and usability tests.
The Department of Defense adopts new certification verification processes
Keeping hard drive data encrypted is more important than ever
Software can establish a baseline of "normal" application activity, then sound the alarm when an app behaves erratically
Two trends are driving the growth of digital signatures for sign-off and revisions of digital documents
HIPAA mandates penalties for data disclosure. Here's how a hospital went about finding an intrusion detection solution.
When it comes to information security, does the U.S. Department of Homeland Security have a blind spot?
What's in store for information security
Charting spyware growth, identity theft at universities, safer Web browsing
Microsoft, Solaris vulnerabilities; top spyware threats; IPS use rising
Spyware is a moving target. Pushing out one level of filters just doesn’t cut it any more.
Database and Imsecure vulnerabilities, search software flaw enables sophisticated phishing attack
Microsoft ISA vulnerability may lead to phishing attacks, a new version of MyDoom targets the IFRAME vulnerability in IE, and survey finds bank clients willing to defect over banks’ lack of ID theft protections
New security-risk management tools bridge the security/business gap