Sensitive corporate data can be stolen at this very second; unfortunately, breaches can be invisible. As cyber threats multiply at an exponential rate, reacting to them like before no longer works. The answer lies in more innovative threat intelligen...
We have elected to put a substantial portion of our defenses on the client rather than the server as it makes our system less vulnerable. It is annoying to administer, but worth the effort as it has prevented virus- and worm-based . . .
The Sobig worm is to thank for a massive increase in spam e-mail during 2003 and the problem of unsolicited commercial junk e-mail is set to get worse in 2004.. . .
A new report issued by Datamonitor found that although 69 percent of companies do not feel that they are at risk of being the victim of a specific and targeted attack, more than 77 percent reported that they had fallen victim to a worm or a virus. Only 18 percent of those surveyed reported no security breach at all.. . .
I've been wanting to get my hands on this book ever since I got the press release announcing this latest addition to the "Hacks Series". When the O'Reilly folks sent us a couple of copies, I've already had a book or . . .
Packet sniffing is a technique of monitoring network traffic. It is effective on both switched and nonswitched networks. In a non-switched network environment packet sniffing is an easy thing to do. This is because network traffic is sent to a hub . . .
Security has been one of the selling points for the new Internet protocol, but IPv6 is not inherently secure, say those planning its implementation. "The biggest challenge we have of the next decade or so is security," Latief Ladid, president of . . .
Automated teller machines at two banks running Microsoft's popular Windows software were infected by a computer virus in August, the maker of the machines said Monday.. . .
As a wireless conference and trade show winds down this week, dueling speakers at the show told audiences that wireless was both ready -- and not so ready -- for prime time in the enterprise. At the Wi-Fi Planet Conference . . .
Who would have thought that Microsoft would be in a position of snubbing Linux for 'security' reasons? It seems very possible that Redmond would like to have vast swathes of Microsoft and Cisco networking disable all Linux traffic and connectivity by default.. . .
When more and more doctors started asking for access to patients' test results online, Sydney Adventist Hospital explored alternatives to some of the solutions being used elsewhere in healthcare. The hospital's first priority was to keep patients' health information secure and . . .
Should there be two security guards, one to spot potential intruders to your house and another one to stop him from getting in? If you transpose this to the enterprise-network situation, we are faced with a classic debate challenging CIO's and . . .
Kevin Curran, an IT lecturer at the University of Ulster's Magee campus, said companies across the province using wireless computer networks were leaving themselves open to hackers who can use their systems to surf the net for free - even for . . .
"Those of you that are involved in creating these products, I don't know what the hell you are thinking of. Are you designing these products for the fellow in the next cubicle, or for consumers?" Vadasz asked a crowd of WLAN . . .
Net users can expect a growth in attacks of Unix systems next year, not to mention more Blaster-style worms capable of infecting computers without using email.. . .
Network security. It's a bad dream and getting more nightmarish all the time. Aside from the mounting attacks by hackers, think also of how increasingly complex and far flung the territory is you must now defend. Sure, maybe you have your . . .
Change the System ID: Devices come with a default system ID called the SSID (Service Set Identifier) or ESSID (Extended Service Set Identifier). It is easy for a hacker to find out what the default identifier is for each manufacturer of . . .
A member of the Debian GNU/Linux system administration team believes there is an unknown local root exploit for the Linux kernel circulating in the wild and says it may have been used to compromise four servers belonging to the free software . . .
Telecommunications companies spend as much as $8 billion a year fixing phones with programming errors, faulty mechanics and other problems. Now some are scrambling to prevent virus attacks that could cost carriers millions of dollars more in repairs and lost business.. . .
Routers are a good way to protect your computer from malicious attacks, but they are ineffective if not configured correctly. For example, wireless routers are inherently less secure than wired ones since they broadcast data back and forth between your computer . . .
A denial of service attack on security website Zonelabs has been blamed for major disruption of the Internet over the past couple of days. According to an anonymous NTL employee's posting on www.frogger.uklinux.net, the DoS attack was launched from 'someone in . . .