Sober.V Spreads, Apple Fixes 20 OS X Vulnerabilities, Mytob Tops Virus List
                    
		            
                
                    
                    
                    
                 
            
                
            
                
	                
                    
                                        
		            
                    Data Storage Security a Concern; Symantec’s 64-Bit Antivirus; Multiple Mozilla, Netscape Vulnerabilities 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    As the effectiveness of e-mail worms decreases, attackers turn to network-based worms. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Eight Firefox Vulnerabilities; Microsoft Previews Longhorn Security; Windows XP SP2 Rollout Lags
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Pharming attacks are on the rise. Should your organization be concerned? 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Ten Microsoft Problems; Lotus Notes and Domino Vulnerabilities
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Automated vulnerability remediation exists, but most companies still take a manual approach
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Executives Decry Cost of SOX, IM Security Still a Concern, and a Mobile Phone Worm Evolves
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Security managers have boosted antivirus and firewall protection, but enterprises may need to switch gears as new regulations target how enterprises handle personally identifying data
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Symantec Antivirus Vulnerability; New Identity Management Acquisitions; NIST Releases HIPAA Security Guide
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Performance takes biggest hit from spyware today; look out for spyware working as a phishing aid
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Free Stuff a Security Risk; New Firefox Flaws Surface
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Cape Cod Cooperative Bank chooses a dedicated appliance to can its network for vulnerabilities
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    What happens when an organization with spyware problems can’t install anti-spyware software on every system?
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Criminal intentions behind half of all attacks; mass-mailing worms on the outs
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Forrester pushes personal firewalls, virus writers join forces, Windows rootkits circulate, Symantec sees kid sites awash in adware
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Many CSOs still have difficulty communicating security requirements to their more business-oriented peers.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Identity theft draws media attention; phishing attacks skyrocket
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Don't forget to secure your VoIP network