Articles By Matthew Broersma

E-gov becomes t-gov

E-gov becomes t-gov

The UK Cabinet Office has published a study into e-government practices, highlighting how governments in the most advanced countries are...

November 27th, 2005 Matthew Broersma
Red Hat goes for Common Criteria approval

Red Hat goes for Common Criteria approval

Red Hat has joined with IBM and software maker Trusted Computer Solutions (TCS) to enter Red Hat Enterprise Linux (RHEL)...

September 29th, 2005 Matthew Broersma
Development tool security hole threatens Internet apps

Development tool security hole threatens Internet apps

A security hole in a popular development tool has severe implications for a number of the Internet’s most popular applications,...

September 1st, 2005 Matthew Broersma
Critical Internet Explorer hole threatens Windows

Critical Internet Explorer hole threatens Windows

Fully patched Windows systems may be at risk from an unpatched, high-risk security hole affecting the latest version of Internet...

August 31st, 2005 Matthew Broersma
DNS servers open to attack

DNS servers open to attack

A large number of Domain Name System servers, a critical part of the Internet’s infrastructure, are vulnerable to attacks that...

August 31st, 2005 Matthew Broersma
HP warns users about flaw in network management product

HP warns users about flaw in network management product

Enterprises using a key network management product from Hewlett-Packard may be vulnerable to a serious flaw allowing remote attacks, the...

August 30th, 2005 Matthew Broersma
Microsoft wins round of Google employee suit

Microsoft wins round of Google employee suit

Microsoft has won the first round in its legal action against Google, with a restraining order that prevents a former...

August 18th, 2005 Matthew Broersma
Adobe issues alert over Acrobat bug

Adobe issues alert over Acrobat bug

Acrobat and Acrobat Reader, two of the most widely used desktop applications, contain serious security flaws that could be used...

August 17th, 2005 Matthew Broersma
New Microsoft security system scours Web

New Microsoft security system scours Web

Microsoft has taken the wraps off a new security program that uses automated "HoneyMonkeys" to patrol the Web, seeking out...

August 10th, 2005 Matthew Broersma
Internet domain system open to fraudulent attack

Internet domain system open to fraudulent attack

A large number of DNS servers, a critical part of the Internet's infrastructure, are vulnerable to attacks that could lead...

August 4th, 2005 Matthew Broersma