Security


How to Stop Bluetooth Insecurities

Bluetooth can be found in newer versions of everything from PDAs to cell phones, but the technology is far from secure. Companies can employ a number of defenses against Bluetooth's risks.

Alert: Microsoft Issues "Critical" Patches

Vulnerabilities found in IE, Word, Excel, FrontPage Server Extensions, and Windows Workstation Service.

Best Practices: Audit Without Getting Overwhelmed

How to create and maintain an effective security program through auditing.

Tips for Gramm-Leach-Bliley Compliance

Security vendor Symantec offers best practices for staying in compliance with the Gramm-Leach-Bliley Act.

Alert: WPA Vulnerable to Dictionary Attack

Wireless networking has a new weakness, according to a new research paper. The problem is with Wi-Fi Protected Access (part of the 802.11i standard) and the way it uses pre-shared keys.

Commentary: Computer Explosion Equals Virus Explosion

China serves as a shining example of the side effects of massive computerization. New users buy computers but don't know how to use them safely.

Top Twenty Virus List for October 2003

A newcomer dominates this month's list



Case Study: Hurricane Stress Tests Firewall at Weather.com

The company's VP of technology weighs in on integrating security able to scale rapidly and fail well.

Alert: British Security Suffers; Apple Patches 14 Vulnerabilities

A new report from McAfee examines European companies' vulnerabilities.

Management's Holy Grail: Integrating Identity and Access Control

Six modules in Computer Associates' new eTrust Identity and Access Management Suite, used in any combination, provide an integrated solution to managing identities, from provisioning to enforcement.

Security Managers Fear Next Generation of Attacks Says Survey

NetScreen survey also reports a widespread belief that current security set-ups are inadequate to defend against these threats

XML: A Growing Security Threat?

The data-swapping standard, now incorporated into Microsoft's Office 2003, may be the next big route for malicious attacks.

Alert: Novell Patches Multiple iChain

Novell beta support pack fixes multiple “highly critical” vulnerabilities. We explain the problem and what you can do about it.

Sharing Hardware Cryptography No Longer Enough

It's no longer enough just to use encryption. Now what's important is how well you've used encryption, how well you administer it, and how well you can prove to auditors what you're doing.

Alert: Windows Messenger Service Vulnerability

Buffer overflow attack could give the attacker administrative privileges

Companies Miss Strategic Security Focus, PricewaterhouseCoopers Says

The problem: how to support an "always on" environment.

Network Associates Puts Up Shield Around Microsoft’s SharePoint

Network Associates launches comprehensive security package for Microsoft’s new SharePoint portal server and associated tools

Q&A: Mitigating the Denial of Service Threat

Security consultant details ways to protect yourself

Best Practices: Five Tips for Managed Security Outsourcing

Yankee Group’s recommendations for getting the most from managed security outsourcing

Dangerous Blended Attacks Increase, Symantec Says

Payload and speed make them especially dangerous; eight best practices for resisting their impact