Last year was the worst year ever for vulnerabilities, says anti-virus software maker F-Secure, in part because virus writers and spammers got together. Here's what you can do to prepare.
Heterogeneous attacks, voice over IP shakedown, and prime time Web services easing security: predictions from an eminent security researcher for 2004 and beyond.
From Linux synchronization and denial of service attacks to some good news about spending on security—a quick look at this week's other security news.
The mainframe is the hub of a network of connected devices, making it ever more vulnerable to attacks.
How integrating security code testing into the development cycle saves time and dollars
Governments have made cyber-crime a matter of public policy. But without an organized, multi-disciplinary, international approach, the problem will remain.
Companies must protect their data as well as their reputations.
Top growth areas: firewalls, IDS/IPS, virus scanning, and vulnerability assessment. By 2005, security managers plan to buy all-in-one appliances that combine these functions. Infonetics Research also
Oracle releases most, but not all patches, necessary to protect against SSL vulnerability. Kaspersky Labs reveals the top troublemakers in November. Yahoo's popular instant messaging program vulnerabilities.
Installing a spam filter helped one Atlanta firm eliminate 95% of unsolicited e-mail.
Security incidents are up 15 percent, and the gap between vulnerability disclosure and exploit shrinks
F-Secure releases a dozen tips to help users avoid common worm problems
Using the laws of physics, not mathematical difficulty, to secure data, MagiQ Technologies' Navajo Security Gateway offers "future-proof, unbreakable" security devices.
Vulnerabilities found in IE, Word, Excel, FrontPage Server Extensions, and Windows Workstation Service.
Bluetooth can be found in newer versions of everything from PDAs to cell phones, but the technology is far from secure. Companies can employ a number of defenses against Bluetooth's risks.
China serves as a shining example of the side effects of massive computerization. New users buy computers but don't know how to use them safely.
How to create and maintain an effective security program through auditing.
Wireless networking has a new weakness, according to a new research paper. The problem is with Wi-Fi Protected Access (part of the 802.11i standard) and the way it uses pre-shared keys.
Security vendor Symantec offers best practices for staying in compliance with the Gramm-Leach-Bliley Act.