Bluetooth can be found in newer versions of everything from PDAs to cell phones, but the technology is far from secure. Companies can employ a number of defenses against Bluetooth's risks.
Vulnerabilities found in IE, Word, Excel, FrontPage Server Extensions, and Windows Workstation Service.
How to create and maintain an effective security program through auditing.
Security vendor Symantec offers best practices for staying in compliance with the Gramm-Leach-Bliley Act.
Wireless networking has a new weakness, according to a new research paper. The problem is with Wi-Fi Protected Access (part of the 802.11i standard) and the way it uses pre-shared keys.
China serves as a shining example of the side effects of massive computerization. New users buy computers but don't know how to use them safely.
A newcomer dominates this month's list
The company's VP of technology weighs in on integrating security able to scale rapidly and fail well.
A new report from McAfee examines European companies' vulnerabilities.
Six modules in Computer Associates' new eTrust Identity and Access Management Suite, used in any combination, provide an integrated solution to managing identities, from provisioning to enforcement.
NetScreen survey also reports a widespread belief that current security set-ups are inadequate to defend against these threats
The data-swapping standard, now incorporated into Microsoft's Office 2003, may be the next big route for malicious attacks.
Novell beta support pack fixes multiple “highly critical” vulnerabilities. We explain the problem and what you can do about it.
It's no longer enough just to use encryption. Now what's important is how well you've used encryption, how well you administer it, and how well you can prove to auditors what you're doing.
Buffer overflow attack could give the attacker administrative privileges
The problem: how to support an "always on" environment.
Network Associates launches comprehensive security package for Microsoft’s new SharePoint portal server and associated tools
Security consultant details ways to protect yourself
Yankee Group’s recommendations for getting the most from managed security outsourcing
Payload and speed make them especially dangerous; eight best practices for resisting their impact