Security


State Department Blames Welchia Virus For Shutdown

Visa applicants left high and dry as government database hit with virus

Q&A: Securing the Door as Important as Securing the Data

Organizations regard the intersection of physical and electronic security—holistic security, if you will—as the end goal

Alerts: New IE Exploit Hacks DNS; Kaspersky Labs' Top Ten Viruses for September

Anti-virus vendors report MS patch does not protect against Trojan Qhosts; September's list of top ten viruses

Best Practices: Minimizing the Risk of Forgotten Modems

Nearly one-fourth of all organizations have unauthorized modems connected to their network, providing easy network access for computer attackers that firewalls won't stop.

Coping with the Gramm-Leach-Bliley Act

We speak with one of the GLBA's five authors to discuss the challenges organizations face as they struggle to stay GLBA-compliant.

Alert: Virus Masquerades as Microsoft Security Update

New worm targets old IE vulnerability.

Security Spending Will Top All IT Investments

IDC predicts security and business continuity spending will increase twice as fast as overall IT budgets between now and 2007.



CERT: Best Practices for Beating Worms

CERT’s Coordination Center outlines the top steps businesses, vendors, and the government can take to arrest the onerous cycle of constant patching.

Best Practices: Staying Ahead of International Regulations

From carrots to sticks, a variety of recent regulations has presented a challenge to security managers. We ask a security expert where U.S. and European regulations are headed.

Alert: Vulnerability in SSH

Versions of OpenSSH prior to 3.7.1 are vulnerable to denial of service attacks via a buffer management problem. We explain the problem and what you can do about it.

Accelerating Security Certification

Can information security professionals really get certified in half the ordinary time?

Finding Security Holes in Your Web Applications

The dot-com boom’s legacy: buggy code. How do you find those bugs? Instead of trying to do code reviews with tools that were meant for developers, it's time to do them with tools meant for security

Authentication: Three Critical Steps for Every Organization

Yankee Group predicts large growth in the authentication market. Here are three things every organization needs to do to ensure users are who they say they are.

Best Practices: Handheld Security

Handheld security expert suggests best practices for organizations that support the devices

Alert: “Critical” Flaw in Office, Other Microsoft Applications

Vulnerability in Microsoft applications occurs thanks to Visual Basic for Applications

Dirty Dozen Viruses: August was a Banner Month

Central Command shows a single virus accounted for over three-quarters of all activity last month.

Alerts: CiscoWorks, P2P Software Vulnerable

Cisco details vulnerabilities in CiscoWorks; eMule code hiding in P2P software

Spammers Increasing Methods to Avoid Detection

Techniques for challenging and defeating spam filters continue to grow

Seeking the Perfect Patch Process

To avoid the patch-and-pray cycle, IT organizations need to examine how to make vulnerabilities such as Sobig seem so small.

Vulnerabilities: IE Cross-Domain Security Flaw, Database Component Exposure

Microsoft releases a patch for IE 5.01 and above; company's Data Access Components could run hacker's code