Microsoft plans to roll out only one "critical" patch on Tuesday, affecting PowerPoint, for its May security update.
- By Jabulani Leffall
- 05/07/2009
Plus: Worms that start with Win; Facebook phishing.
- By Jabulani Leffall
- 05/05/2009
Independent software vendors have long been the life of Microsoft's party by producing products that fill in the gaps Redmond leaves open. For Tech•Ed North America 2009, we celebrate third-party vendors and preview what they'll be announcing and demonstrating at the show.
White-listing certain applications is one way to make sure your network stays safe.
- By Joern Wettern
- 05/01/2009
Companies looking to reduce costs through cloud computing will have to make some tough decisions about security.
- By Naomi Grossman
- 05/01/2009
How Adobe is handling critical vulnerability discovered in its Reader software gets mixed reaction from IT security experts.
- By Jabulani Leffall
- 05/01/2009
Microsoft rolled out Service Pack 2 (SP2) for Windows Vista and Windows Server 2008 in its "release to manufacturing" form.
Concerns about the security implications of evolving cloud computing technologies dominated last week's annual RSA Conference.
- By John K. Waters
- 04/28/2009
Microsoft moves to make worms less effective. Plus: RSA kicks off security conference season; Google to school IT pros on the perils of cross-site scripting; and the FBI weighs in on Conficker.
- By Jabulani Leffall
- 04/28/2009
Microsoft last week described improved security features in its upcoming Windows 7 operating system, currently in beta release.
- By Herb Torrens
- 04/27/2009
Writing more secure software is not a simple task, but it can and should be done for applications, experts say.
- By William Jackson
- 04/24/2009
Researchers from Finjan Software Inc. announced at the RSA Security conference the discovery of a new botnet on nearly 2 million infected computers -- many of them in U.S. government networks.
- By William Jackson
- 04/23/2009
At a time when everyone is watching the bottom line, there is an increasingly strong impetus to virtualize IT environments.
- By William Jackson
- 04/23/2009
There are a wealth of commercial tools available to help secure networks, but getting them to share information so that administrators have more than a piecemeal picture of their systems can be a challenge.
- By William Jackson
- 04/22/2009
Web browsers offered soft and interesting targets for hackers in 2008, who took advantage of them to attack the increasingly rich Web experience, said security expert Jeremiah Grossman.
- By William Jackson
- 04/21/2009
As cyber security problems become more widespread, Microsoft urged the IT community to take a more active role, and described its security approach.
- By Jabulani Leffall
- 04/21/2009
UAC not so snarky in Windows 7. Plus, .NET exploit; Internet dangers; hiring hackers.
- By Jabulani Leffall
- 04/21/2009
Microsoft announced the beta 2 release of "Stirling," which is the code name for an integrated suite of enterprise security solutions based on Forefront products.
- By Jabulani Leffall
- 04/16/2009
The number of compromised computers actively being used in botnets to launch attacks on any given day last year was about 75,000, according to a new report on Internet threats from Symantec Corp.
- By William Jackson
- 04/15/2009
Yes, Conficker manages to remain in minds of IT security. Plus: tweeting birds get the worm and why security standards equal a bad idea.
- By Jabulani Leffall
- 04/14/2009