Sensitive corporate data can be stolen at this very second; unfortunately, breaches can be invisible. As cyber threats multiply at an exponential rate, reacting to them like before no longer works. The answer lies in more innovative threat intelligen...
The WU-FTPD Development Group at www.wu-ftpd.org have released the first "official" bugfix patch to fix the lreply bug in wu-ftpd. This patch is for the source code. The patch is relevant to all platforms: Linux, Solaris, SCO, BSD, etc. . . .
Intel chief exec admits that the future of wireless and mobile technology is overshadowed by security complications. Speaking at Intel's Wireless Competency Centre in Stockholm this week managing director Leif Persson acknowledged hugely complicated wireless environments are causing them . . .
The White House on Wednesday endorsed an Internet industry initiative aimed at boosting online privacy just hours before acknowledging that one of its own Web sites may have violated federal privacy policy.. . .
Networks face three vulnerabilities: physical security problems, logical security problems such as computers within a network, and security problems involving people -- all of which should be equally important to businesses, according to a British Telecommunications executive speaking here at InfowarCon Thursday.. . .
My favorite trade mag has a new look. Here's a good (albeit, short) article on network security and privacy. "The Internet is a powerful tool that promises its users many exciting possibilities, including unprecedented access to a vast expanse . . .
The absence of a catastrophic cyberattack against the United States has created a false sense of cybersecurity and has allowed costly Cold War-era Pentagon programs to siphon money from critically needed information technology and security programs, a panel of experts warned last week.. . .
Hacker News Network writes, "About a year ago two gentlemen in New Zealand were evaluating Netbus Pro for tech support use, and because of this they were fired by their employer. The employee's own words can be read as well.. . .
America Online Inc. was still investigating an attack by vandals who fooled several company employees to gain access to an undisclosed number of member accounts. So far, however, no clues -- or at least none that the company is ready . . .
Register.com, the second-largest domain name registrar, has acknowledged a security problem that could have allowed people to hijack others' Web sites. The problem allowed unauthorized access to the security software Register.com and its business partners use to manage Internet site information, . . .
America Online confirmed Friday that some of their employee accounts have been compromised by hackers, and that the accounts were used to gain access to and view details of some personal user accounts. A spokesman for AOL, the largest Internet service . . .
Noel writes about some things that a System Administrator should consider about trust when configuring or maintaining a system. "One of the first things many of us think about is the trust we give to the users of our systems. . . .
Some Internet advertising companies are watching every click and drag that computer users make at home or in the office, and the Senate is considering doing something to stop it. Jodie Bernstein, director of the Bureau of Consumer Protection at the . . .
As it turns out, the most recent build of Sub7 contains an undocumented feature which can indeed be used to ping the living hell out of Web servers, from numerous infected clients simultaneously, according to research just completed by security outfit . . .
America Online has confirmed that hackers have illegally compromised an undisclosed number its member accounts by targeting key company employees with an email virus. AOL spokesman Rich D'Amato declined to comment on how many . . .
IT decision makers have come under fire for failing to invest in adequate network security as more companies adopt ecommerce strategies. According to a report by research house Ovum, organisations are increasingly relying on an out-dated approach to security. A . . .
This article discusses the recent NetSec 2000 conference, and provides suggestions as to how the risks from DDoS attacks can be mitigated. "When the attacker decided it was over, it was over," said Alex Wellen, a producer at . . .
In its report E-Business Security: New Directions and Successful Strategies, Ovum argues that the traditional hierarchy of trust adopted by organisations does not fit the ebusiness model, meaning that access channels, such as mobile devices, could pose a major security threat. . . .
This article explains how to secure a Linux gateway. If you do not have a gateway already setup, it suggest that you read this article. The author assumes that you are already familiar with Linux and currently . . .
HACKERS 2000, a seminar organised by the Trade Fair and Conferences International drew a diverse crowd, from college freshers who boasted about their hacking abilities to old software hands and the presentations were equally diverse. If, Bipin Amin, technology consultant, . . .