What's the top threat to data security going to be in 2009? According to the GTISC Emerging Cyber Threats Report for 2009 out of Georgia Tech's Information Security Center, the answer is malware specifically disguised as "benign social networking links."
Sophos quickly warns of fake Trojan-laden e-mail disguised as Microsoft Security Bulletin update hitting inboxes.
- By Jabulani Leffall
- 10/16/2008
Plus: shedding more light on version 2 of Microsoft's RIA app; Citrix looking for total virtualization domination.
Security-minded admins have their work cut out for them, as Microsoft coughs up 11 fixes in its October patch cycle.
- By Jabulani Leffall
- 10/14/2008
Microsoft has been talking about future changes to Windows Vista's most maligned feature, User Account Control (UAC).
- By Herb Torrens
- 10/13/2008
New security appliance gives DBAs a leg up on flaws and vulnerabilities lurking in corporate database management systems.
- By Jabulani Leffall
- 10/13/2008
Microsoft's October patch release cycle promises to be a busy one as Redmond announced plans to roll out 11 security bulletins in its Tuesday security release.
- By Jabulani Leffall
- 10/09/2008
A new study from Gartner concludes that the WLANs of today comprise a "significant vulnerability" for enterprise IT organizations.
- By Stephen Swoyer
- 10/07/2008
Migration to virtualization won't be the quick transition that some technology evangelists have predicted, according to recent surveys by two IT security companies.
- By Jabulani Leffall
- 10/07/2008
Jet-setters should be careful about how they use the Internet connections supplied by hotels, as most are not secured properly, according to a new study from the Cornell University School of Hotel Administration.
- By Joab Jackson
- 10/03/2008
Yahoo plans to resolve a password security vulnerability identified last week in its Zimbra open source e-mail and collaboration software.
- By Jabulani Leffall
- 10/02/2008
You can talk about SCADA. You can talk about vulnerabilities. But be careful about conflating the two.
Managing users' multiple identities -- and their multiple phases -- can get complicated. That's where ILM comes in.
- By Joern Wettern
- 10/01/2008
The Payment Card Industry Council on Wednesday released an updated version of its PCI data security standard, which is designed to help protect transmitted charge and debit card information.
- By Jabulani Leffall
- 10/01/2008
They call it private browsing. Microsoft recently released a beta version of Internet Explorer 8 that offers it. You'll find it in Mozilla's Firefox and the new Google Chrome. Apple's Safari has offered the feature for some time.
- By William Jackson
- 09/30/2008
What is clickjacking? Security pros are trying to make sense of a new bug found by researchers that apparently affects various Web browsers, including Microsoft's Internet Explorer.
- By Jabulani Leffall
- 09/29/2008
The United States was the top source of distributed attack traffic, originating nearly three times as many attacks as second-place China, according to a recent study by security service provider SecureWorks Inc.
- By William Jackson
- 09/23/2008
McAfee Inc. has agreed to purchase Secure Computing Corp. for about $465 million.
- By David Hubler
- 09/22/2008
Microsoft is crossing the aisles to see the security process through from start to finish -- not just internally, but for outside software developers too.
- By Jabulani Leffall
- 09/18/2008
Microsoft this week released a white paper on identity theft with the aim of starting a "vendor-neutral" discussion on the use of "information cards" as an Internet security solution.
- By Jabulani Leffall
- 09/18/2008