Security: Vulnerabilities


Regulations, Fear Driving More-Secure Code Development

To counter security threats, developers can reverse-engineer their products, or take a less expensive and more effective approach

Microsoft Can’t Count: New Vulnerability Disclosure Criticism

Microsoft details five critical vulnerabilities, including flaw that could be automatically exploited by a malicious Web page or e-mail

Q&A: The State of Endpoint Security

Organizations can derive the benefits of endpoint-security standards without the standards

Zero Day Initiative Trades "Points" for Vulnerabilities

Know of a harmful vulnerability that hasn’t gone public? A new program wants to hear about it.

CSI Study Reveals Shifts in Security Threats

The latest Computer Crime and Security Survey shows cybercrime incidents and the cost of security breaches are decreasing, but Web site attacks and thefts of sensitive information are rising quickly.

Microsoft and Apple Patch Operating Systems

Microsoft patches two buffer overflow vulnerabilities, Apple patches OS X 10.4

Case Study: Containing Endpoint Infections

How can organizations better contain virus outbreaks and defend against destructive or mass-mailing worms?

Enterprises Battle Cyber-Criminals, Targeted Attacks

Automated worms and malware-born invaders are still wreaking havoc in the enterprise, and financial losses from cyber-criminals are increasing.

In Brief

Targeted Trojan Attacks Increase, Security Zaps Productivity, Spyware Distributor Settles

CSO Worries High, Actions Lax

CSOs worry about infected or unknown PCs logging onto their networks, but only one-third of companies are doing something about it

Guarding Against Esoteric Security Leaks

Analyzing esoteric attacks highlights where security can succeed and how secure devices can fail in unforeseen ways.

In Brief

Bluetooth Attack Compromises PINs, New Smart Phone Malware, Charting the E-mail Security Market

Caveat Browser: Mozilla Targeted

Will security flaws dent Mozilla's status as a trusted alternative to Internet Explorer?

In Brief

Microsoft Updates XP WiFi Security, Worm Goes Right-Wing

Q&A: Sorting Out Desktop Protection Technologies

The differences between signature-based, access control, and intrusion prevention products

In Brief

CA Antivirus Vulnerabilities; AOL Patches New Netscape; Beware Phishing E-mails Bearing Keylogging Software; New Trojan Encrypts PCs

Severity of Spyware Attacks Escalates

Despite dedicated software to defend the enterprise, the economics of spyware leads attackers to respond with more complex attacks or attacks aimed at just one company.

In Brief

Prosecuting Spyware Makers, A New Endpoint Security Standard

Q&A: Is Microsoft's Security Trustworthy?

Three years after Microsoft launched an initiative to improve its products’ security, we talk to information security veteran Gary Morse, president of Razorpoint Security Technologies, about the results.

SANS Top Vulnerability List Gets Quarterly Updates

List helps prioritize vulnerability patching