Security


Web Caller-ID Arrests Spoof Sites

New technology in a user-friendly toolbar intercepts users from visiting such sites

Digital Certificates Secure Web Services, Mobile Communications

Public key infrastructure isn't dead yet.

VoIP Growth Brings Focus on Security Holes

Use of the Internet for telephone calls brings to the fore how security concerns could now spread to your once-secure communications system.

Top 10 Security Modifications in Windows XP Service Pack 2

This XP Service Pack should be called a Security Pack

Briefs

Problems Found in Graphics Library, Mozilla, and PDAs

In Brief

Samba Exploits, Dumping IE, and Securing iPaqs

Regulations, Productivity Spark Enterprise IM Adoption

Free and paid instant messaging use will rise dramatically in the next four years



Five Steps to Make Your Security More Proactive

While no single solution solves all problems, getting ahead of security problems can bring big rewards. Here's how to get started.

Case Study: UCI Cinema Adopts SSL VPN for Anytime, Anywhere Access

With personal e-mail available in an instant from any connected PC via free Web-mail accounts, users want to know why their corporate e-mail, applications, and documents can’t behave the same way.

Linux Gets Host Application Security

New modules in the Linux 2.6 kernel make for easier host-based application security.

Locking Down Endpoints to Prevent Virus Resurgence

Verifying PC security compliance before granting network access

Briefs

IM Migration Deals, Mobile Viruses, and Zip-File Vulnerabilities

Top 10 Control Points For Your Local SAM

Forgetting to audit your local SAMs can prove disastrous

Q&A: Eradicating Spyware in the Enterprise

Finally there's software to let enterprises remove spyware.

Briefs

Microsoft details vulnerabilities (including extremely critical IE problems); safeguarding CAD drawings in your browser

Case Study: Managing Zip Files with Security Controls

System vulnerabilities can creep in through compressed files. But does completely blocking their use make for good security policy?

A Busy Month for Attackers

From anti-spam lawsuits to ever-more-clever hacking techniques, June was yet another month full of vulnerabilities for unsuspecting users.

In Brief

Windows XP security best practices, better SAML administration

DumpSec's Shortcomings Mask the Full Security Picture

Don’t let DumpSec fool you into a security comfort zone

IT Turns to SMTP-Level E-mail Blocking

New approaches focus on stopping unsolicited e-mail before it's even received