Security Archives - Page 331

president, SHRC

president, SHRC

Most stories of IT security breaches inevitably end with a humbled company official declaring that their IT security will be...

July 21st, 2005 Rosie Lombardi
associate director, Center for Democracy and Technology

associate director, Center for Democracy and Technology

The Anti-Spyware Coalition (ASC), a group of IT companies and public interest groups, is hoping to succeed where a previous...

July 12th, 2005 China Martens
Spam Blacklist Question and Answer

Spam Blacklist Question and Answer

META Trend: As ad hoc electronic communication grows in importance (e.g., e-mail, instant messaging, Web conferencing), organizations will be challenged...

July 11th, 2005 Matt Cain
CA launches security applications package

CA launches security applications package

Computer Associates recently unveiled a suite of applications designed to address the anti- virus, data backup and PC migration needs...

July 7th, 2005 Denise Dubie
Entuity adds VoIP, blade server management

Entuity adds VoIP, blade server management

Entuity this month announced it had upgraded its flagship management software with features that will help corporate customers collect data...

July 7th, 2005 Denise Dubie
Routers dealt worm worries

Routers dealt worm worries

How is a router worm like a flu pandemic? Medical researchers say an outbreak of influenza, similar to the devastating...

July 7th, 2005 Rosie Lombardi
Linux vendors pump out highly critical patch

Linux vendors pump out highly critical patch

Gentoo Linux has warned of a serious, unpatched security flaw in zlib, a compression library widely used in Linux and...

July 7th, 2005 Matthew Broersma
Microsoft offers workaround for IE vulnerability

Microsoft offers workaround for IE vulnerability

Microsoft Corp. has released software that can be used to mitigate a critical vulnerability in Internet Explorer that was first...

July 6th, 2005 Robert McMillan
How hackers turn to cybercrime : Study

How hackers turn to cybercrime : Study

What started out as an online businessman’s dirty tactic lasted for almost half a year and cost victims over US$2...

July 5th, 2005 Mari-Len De Guzman
Web apps compromised by security hole

Web apps compromised by security hole

Security vulnerabilities have been discovered in a widespread Web services protocol which could allow an attacker to take control of...

July 4th, 2005 Matthew Broersma