Sensitive corporate data can be stolen at this very second; unfortunately, breaches can be invisible. As cyber threats multiply at an exponential rate, reacting to them like before no longer works. The answer lies in more innovative threat intelligen...
SEPTEMBER 27, 2004 (COMPUTERWORLD) - In an effort to cut costs, my company has decided to migrate from private branch exchanges to IP telephony. By routing calls over our existing IP network and using voice-over-IP links, we can significantly cut our telecommunications costs, especially since we have significant telephone traffic between our U.S. offices and places like Europe and India, as well as other parts of Asia. . . .
Employees are increasingly demanding that enterprises deploy wireless LANs (WLAN). While many companies are acceding to their demands, security issues are the main factor inhibiting even faster uptake of the technology. . . .
The average daily volume of Internet attacks declined in the last six months, according to Symantec Corp.'s Internet Security Threat Report. Released last week, the report is a snapshot of security events derived from monitoring 20,000 security devices. . . .
According to a semi-annual report released by Symantec this week, these bot nets, are growing at an incredible rate. Last year, Symantec saw about 2,000 machines per day recruited into these bot armies. In its new report, that figure had grown to 30,000 per day. An unprotected machine will typically be attacked within 20 minutes of being put on the Internet, according to Weafer. "The fastest we've seen was a machine taken over six seconds after it was connected to the Web," he says. . . .
In less than a month, it will be illegal to send commercial messages to any Internet domain associated with wireless messaging subscription services.The ban is the result of rules adopted by the Federal . . .
The security of wireless LANs (WLANs) is the biggest factor inhibiting their growth in enterprises, but few large enterprises have suffered security breaches, according to a survey released Tuesday by JupiterResearch. . . .
Networks of computers that are exploited by spammers and hackers to forward junk e-mail and viruses without the knowledge of the PC user, known as bot networks, are on the increase, according to anti-virus firm Symantec. . . .
Attacks on Windows machines in the first six months of 2004 jumped nearly four-and-a-half times over the same period last year, a security firm said Monday, leading to an explosion in the number of hacker-run bots. . . .
SEPTEMBER 20, 2004 (COMPUTERWORLD) - ... with a compact, 6 oz. 802.11b Wi-Fi device that can turn a simple dial-up line into an online access point for an 11Mbit/sec. Ethernet wireless network. The WiFlyer from Houston-based start-up Always On Wireless Inc. will up the ante in ease of Internet access when it ships in mid-October. The $149 device creates an instant wireless LAN that connects up to 14 PC or Macintosh users. . . .
Each week vnunet.com asks a different expert to give their views on recent security issues, with advice, warnings and information on the latest threats.This week Jukka Sieppi, director of product management . . .
Hughes Network Systems Inc. hopes to provide companies with a satellite option to connect a VPN for users in remote locations that otherwise lack adequate network infrastructure. . . .
It's a hacker's nightmare but a dream for bankers and spies: A computer network so secure that even the simplest attempts to eavesdrop will interrupt the flow of data and alert administrators to the snooping . . .
Take that wireless hot spot in the local java joint, jack it up on steroids and use it to connect an entire city full of computers. That, in short, is WiMax, a cutting-edge wireless technology that's starting to prove its worth as a fast, cheap and easy networking option for businesses. . . .
DRIVING through the central business district of Makati all the way to Malate in Manila, a German whitehat hacker discovered that only 15 of the 66 wireless access points or wireless local area networks located in these two areas were "encrypted." . . .
HACKERS worldwide will gradually find it more difficult to hack into computer networks even as their communities continue to grow, according to a German hacker known as Van Hauser. . . .
Security researchers have issued a warning of a flaw in the Trillian cross-platform instant messaging (IM) client that puts users at risk of malicious hacker attacks. . . .
COMMENTARY--Voice over Internet Protocol (VoIP) looks to be the next big deal, a business disrupter that could change everything in the telecoms world. The first service offerings have been launched and customer . . .
The two predominant themes in the responses I received on my Blended Threat column two weeks back were rage and resolve.Many of you were tired of dealing with spam, viruses, malware, and even legitimate but persistent and annoying advertisements. . . .
Last fall, the Blaster Internet worm slammed into Cable Bahamas like a digital hurricane, clogging Web connections for the tiny Internet service provider's 22,000 subscribers. . . .