Security


Microsoft Ups Exploit Code Warning

It looks like that Redmond's hunch was correct when it issued an out-of-cycle security patch late last week, because on Wednesday Microsoft identified publicly available exploit code related to that vulnerability.

Security Concerns May Slow Cloud Computing Adoption

Microsoft may have reaffirmed its commitment to cloud computing with the launch of its Windows Azure operating system, but overall business adoption of the cloud concept may be stymied, in part, by security issues.

Microsoft Calls New Cloud Computing OS a 'Turning Point' for Company

At its Professional Developers Conference in Los Angeles this week, Microsoft is unveiling the end-to-end vision for its Software plus Services platform.

Organizations Cutting Back on IT Security Staff

The IT security function, as a percentage of total IT staff at enterprise organizations, appears to be in decline, according to an addendum on security in a research report released this week by Computer Economics.

IT Pros List Coolest Security Jobs

Looking for the coolest jobs in IT? A new survey of information technology and network security specialists suggests that the place to look is on the front lines of cyberspace -- and that the variety of work is greater than many might suspect.

Off-Cycle Microsoft Patch Targets Worm-Like Windows Bug

Redmond on Thursday released a critical out-of-cycle security patch affecting Windows 2000, Windows XP and Windows Server 2003 systems.

Bad Times Call for a Security Check, Experts Say

"Disaster breeds opportunity," so the old slogan goes. But when it comes to uncertain economic times, companies should double-check their internal policies and procedures, security experts say.

Alcatel-Lucent Beefs Up Enterprise Laptop Security

Enterprise IT professionals concerned about laptops holding proprietary corporate data should be heartened by a new 3G mobile security technology update from Alcatel-Lucent.

Malware Disguised as Social Networking Tops Emerging Security Threats

What's the top threat to data security going to be in 2009? According to the GTISC Emerging Cyber Threats Report for 2009 out of Georgia Tech's Information Security Center, the answer is malware specifically disguised as "benign social networking links."

Fake Microsoft Security Update Makes Rounds

Sophos quickly warns of fake Trojan-laden e-mail disguised as Microsoft Security Bulletin update hitting inboxes.

Vista's UAC a Winner in Win7?

Plus: shedding more light on version 2 of Microsoft's RIA app; Citrix looking for total virtualization domination.

Busy October Patch Cycle Comes Around with 11 Fixes

Security-minded admins have their work cut out for them, as Microsoft coughs up 11 fixes in its October patch cycle.

Microsoft Promises To Improve UAC in Windows 7

Microsoft has been talking about future changes to Windows Vista's most maligned feature, User Account Control (UAC).

Fortinet Helps DBAs Sniff Out DB Exploits

New security appliance gives DBAs a leg up on flaws and vulnerabilities lurking in corporate database management systems.

11 Fixes Expected for Patch Tuesday

Microsoft's October patch release cycle promises to be a busy one as Redmond announced plans to roll out 11 security bulletins in its Tuesday security release.

Gartner Warns of Wi-Fi Vulnerabilities

A new study from Gartner concludes that the WLANs of today comprise a "significant vulnerability" for enterprise IT organizations.

Surveys Raise Doubts on Virtualization Security

Migration to virtualization won't be the quick transition that some technology evangelists have predicted, according to recent surveys by two IT security companies.

Beware of Hotel Internet Connections

Jet-setters should be careful about how they use the Internet connections supplied by hotels, as most are not secured properly, according to a new study from the Cornell University School of Hotel Administration.

Yahoo Fixing Zimbra Bug, Integrating With Exchange

Yahoo plans to resolve a password security vulnerability identified last week in its Zimbra open source e-mail and collaboration software.

Bringing Down the Grid

You can talk about SCADA. You can talk about vulnerabilities. But be careful about conflating the two.

Subscribe on YouTube