Security


Critical Windows and Office Fixes Coming Tuesday

Microsoft plans to release four software fixes on Tuesday in its July security update

Twitter and FTC Settle Over Privacy Breaches

Twitter agreed to settle Federal Trade Commission charges that it put consumer privacy at risk.

Microsoft Issues Advisory on Windows Help Flaw

Microsoft today issued a new security advisory on a Windows help function flaw

Top IT Security Concerns Voiced in Survey

Network breaches top IT concerns

Microsoft's May Patch Aims at Office Vulnerabilities

After a thick April patch, this month's security update, released today, is light with only two "critical" fixes.

Art of Defence Extends Distributed Web Application Firewall to the Cloud

Hyperguard SaaS Standard offers Web application security monitoring, detection-only, and protection modes.

Study Spotlights Privacy, Data Security Vulnerabilities at Financial Services Firms

Consumer data in vulnerable during development, testing.



RSA Keynote: Cloud's Future Depends on Security

People must be able to trust the cloud, RSA president says.

Microsoft Tries To Clean Up COFEE Spill

Computer Online Forensic Evidence Extractor distributed on "pirate" sites.

Losses Mount as Security Risks Rise and IT Struggles

A new survey by Symantec of 1000 organizations in the U.S. and Europe highlights the rise in security risks and actual damage done

Hackers Enlist Search Engines for Phishing Attacks

Hackers are increasingly attempting to influence search engines to misdirect users to spurious Web sites

ID Thefts, Damage on the Rise

ID fraud spiked last year by almost a quarter, yet the total amount bilked by ID thieves rose only slightly.

Beyond AV Protection with Web Filtering

If you’re looking to breathe extra life into your fleet of PCs and to keep your network as secure as possible, make sure you’re using a secure Web filter.

Fostering a Culture of Compliance: Six Steps to E-Mail Security

To successfully address weaknesses in current e-mail security, IT departments can take six proactive steps now to help their enterprises meet compliance regulations and prevent e-mail misuse.

Removing Admin Rights Dramatically Cuts Vulnerabilities, Study Finds

One of the biggest threats facing your organization is already installed on your desktops: admin rights for end users

Q&A: Best Practices for Access Management

We look at the purpose and best use of groups and roles.

Standing Firm on Security Spending

Why now is not the time to cut security budgets.

Q&A: Protecting Growing Data Volumes

Data protection challenges grow as data volumes grow. We examine the best practices IT can follow to maximize data protection.

ID Theft Red Flags: The Challenge for IT

What enterprises and IT must do to enhance their risk-management program.

Spammers to Target Job-Hunting, Professional Networking in 2009

Security consultancy AppRiver anticipates a new wave of spam and malware attacks focusing on job-hunting and professional networking sites.