Security


Report: Last Year Was Worst Ever for Viruses

Last year was the worst year ever for vulnerabilities, says anti-virus software maker F-Secure, in part because virus writers and spammers got together. Here's what you can do to prepare.

Which Bugs Will Bite? Vulnerability Predictions for 2004

Heterogeneous attacks, voice over IP shakedown, and prime time Web services easing security: predictions from an eminent security researcher for 2004 and beyond.

Alerts: Linux Vulnerabilities, Security Spending, Symantec's List of Top Threats in November

From Linux synchronization and denial of service attacks to some good news about spending on security—a quick look at this week's other security news.

Mainframe Security: Good Enough for the 21st Century?

The mainframe is the hub of a network of connected devices, making it ever more vulnerable to attacks.

Q&A: Arresting Bugs Earlier in Development Cycle Cuts Security Costs

How integrating security code testing into the development cycle saves time and dollars

Commentary: Solving Internet Crime Needs International Approach

Governments have made cyber-crime a matter of public policy. But without an organized, multi-disciplinary, international approach, the problem will remain.



Q&A: Protecting Web Applications from Unknown Attacks

Companies must protect their data as well as their reputations.

Security Budgets Will Rise Rapidly, Researchers Predict

Top growth areas: firewalls, IDS/IPS, virus scanning, and vulnerability assessment. By 2005, security managers plan to buy all-in-one appliances that combine these functions. Infonetics Research also

Alerts: Oracle Patch; Top Viruses for November; Yahoo Messenger Vulnerability

Oracle releases most, but not all patches, necessary to protect against SSL vulnerability. Kaspersky Labs reveals the top troublemakers in November. Yahoo's popular instant messaging program vulnerabilities.

Case in Point: Law Firm Battles Spam

Installing a spam filter helped one Atlanta firm eliminate 95% of unsolicited e-mail.

Security Attacks More Varied and Aggressive, ISS Report Shows

Security incidents are up 15 percent, and the gap between vulnerability disclosure and exploit shrinks

Best Practices: Avoiding Computer Worms

F-Secure releases a dozen tips to help users avoid common worm problems

Quantum Cryptography Offers Uncrackable Keys

Using the laws of physics, not mathematical difficulty, to secure data, MagiQ Technologies' Navajo Security Gateway offers "future-proof, unbreakable" security devices.

Alert: Microsoft Issues "Critical" Patches

Vulnerabilities found in IE, Word, Excel, FrontPage Server Extensions, and Windows Workstation Service.

How to Stop Bluetooth Insecurities

Bluetooth can be found in newer versions of everything from PDAs to cell phones, but the technology is far from secure. Companies can employ a number of defenses against Bluetooth's risks.

Commentary: Computer Explosion Equals Virus Explosion

China serves as a shining example of the side effects of massive computerization. New users buy computers but don't know how to use them safely.

Best Practices: Audit Without Getting Overwhelmed

How to create and maintain an effective security program through auditing.

Alert: WPA Vulnerable to Dictionary Attack

Wireless networking has a new weakness, according to a new research paper. The problem is with Wi-Fi Protected Access (part of the 802.11i standard) and the way it uses pre-shared keys.

Tips for Gramm-Leach-Bliley Compliance

Security vendor Symantec offers best practices for staying in compliance with the Gramm-Leach-Bliley Act.