Problems with Adobe Acrobat, Microsoft .NET, and phpMyAdmin
When it comes to information security, does the U.S. Department of Homeland Security have a blind spot?
Two Endpoint security initiatives are underway—one from Cisco, the other from Microsoft. We take a closer look at these plus the evolution of endpoint security.
The latest security announcements from Hewlett-Packard
Security settings deployed with Group Policy are highly efficient but not guaranteed by default. With a few extra steps you can guarantee that these security settings apply persistently to computers.
What's in store for information security
Charting spyware growth, identity theft at universities, safer Web browsing
Spyware is a moving target. Pushing out one level of filters just doesn’t cut it any more.
The Yankee Group predicts that by 2010, 90 percent of all security will be outsourced. Here's how one company made its decision to choose a pro-active security solution.
Microsoft, Solaris vulnerabilities; top spyware threats; IPS use rising
A packet-shaping tool can help handle worm outbreaks.
Database and Imsecure vulnerabilities, search software flaw enables sophisticated phishing attack
Denial is not a legitimate wireless strategy
Finding code problems was the challenge; a service provider's analysis held the answer
Better security updates in the offing
Microsoft ISA vulnerability may lead to phishing attacks, a new version of MyDoom targets the IFRAME vulnerability in IE, and survey finds bank clients willing to defect over banks’ lack of ID theft protections
Highly critical IE vulnerability lacks patch; new attacks reanimate mobile AV
Setting the open-source security record straight
To more rapidly test patches and keep network configurations from drifting, keep a closer watch on every device’s configuration
Passwords protect user logon and resource access, but only if the underlying authentication protocols are secure. Here's how to overcome vulnerabilities of older protocols.