WholeSecurity gives businesses the ability to offer their customers an opt-in PC security sweep to quarantine malicious software
New warnings about Web hosting control panel protection, ISS server-response processing, and Symantec's security software
Security flaws reveal weaknesses in Microsoft's Abstract Syntax Notation One, a cryptographic and authentication mechanism in use by every Window operating system. The problem is with the compiler, not the applications themselves. It's time for developers to patch and recompile quickly.
Microsoft upgrades Outlook XP's vulnerability to "critical" after researcher finds additional flaws; company urges patch be applied quickly
The battle to capture your e-mail address has gone to new levels: deleting competing worms.
New Vulnerabilities Steal Financial Data Via ICQ, Target P2P File Traders, and Delete Office Files
The company is querying its user base for security enhancements; meanwhile, security option defaults will be changed in future releases and updates.
Sarbanes-Oxley; partnering for security; security certification guide
Microsoft Warns of Critical ASN.1 Vulnerability; More Doom Unleashed
Companies turn to managed Service providers for help; desktops dominate security budgets as patches average $234 per machine.
Newest vulerabilities feed on old worm to take aim at Microsoft's Web site
Best practices in keeping the desktop secure
New Mydoom variants; Vulnerabilities in IE browser, Checkpoint products; January a banner month for threats.
The latest threats have companies reconsidering their anti-virus tools, wondering if AV is becoming irrelevant. Increasingly, companies are looking at application-level personal firewalls and all-in-one gateway hardware for PCs.
MyDoom monopolizes Internet via e-mail harvesting, P2P file sharing, back door
Coding errors in Web Services code at your partners can trigger problems on your own systems.
New worm and Trojan software unleashed; purported PayPal mail carries worm
Voice-over-IP vulnerabilities; impact to Microsoft's ISA Server 2000
IT needs to move from looking at events coming from particular sensors to recognizing patterns of activity coming into that infrastructure.
Using investigations to satisfy Sarbanes-Oxley requirements; learning from 2003's vulnerability onslaught