Spyware is a moving target. Pushing out one level of filters just doesn’t cut it any more.
Database and Imsecure vulnerabilities, search software flaw enables sophisticated phishing attack
Microsoft ISA vulnerability may lead to phishing attacks, a new version of MyDoom targets the IFRAME vulnerability in IE, and survey finds bank clients willing to defect over banks’ lack of ID theft protections
New security-risk management tools bridge the security/business gap
Blame unusable security, not users; Apple worm; high-speed IPS
Free hard-drive indexing utility raises corporate security and privacy questions
As more organizations embrace Web services (which opens back-office processes to partners and the Internet), a problem is emerging: who inside the organization is in charge of Web services security?
How one financial company distributes secure information to its board of directors, many of whom work in an insecure environment
Knowing how today's hackers think and work is the first step to combating their attacks.
Software vaults are increasingly the solution for securing passwords, notes from the board of directors, and more
Smart cards, currently a favorite of governments and large corporations, are getting more powerful, incorporating Java and USB technologies.
Most attacks are relatively unsophisticated, planned in advance, conducted during normal business hours, and start from inside the organization. The common driver comes as no surprise: money.
Most unsolicited e-mail originates in U.S., survey finds; securing storage; name-dropping attacks
Once they seemed doomed, but public key infrastructure is taking off, driven by e-commerce servers, Pentagon requirements, and government regulations.
Aeroplan adopts an XML firewall
This XP Service Pack should be called a Security Pack
Public key infrastructure isn't dead yet.
Free instant messaging services are just one of the many security holes facing corporate IT
New approaches make it easier than ever to add network-wide transparent data encryption