Security


iPhone Lure Used in Hacker Exploit

The iPhone hype makes it a natural target -- by scammers looking to sell Apple's first cell phone for a huge markup, and also by hackers looking to add to their bot networks.

Cyber Attacks Engulf Kremlin's Critics

A political battle is raging in Russian cyberspace. Opposition parties and independent media say murky forces have committed vast resources to hacking and crippling their Web sites in attacks similar to those that hit tech-savvy Estonia as the Baltic nation sparred with Russia over a Soviet war memorial.

Ohio's Laptops Often Stolen or Missing

In Dayton, a state employee returns to work to find a $2,000 computer stolen. In Cleveland, someone walks into an unlocked office and takes a $2,200 laptop belonging to the state auditor's office.

The Essential Security Toolbox

From protocol analyzers to vulnerability scanners, here are some tools that can help keep your network secure.

Windows Mobile Dogged by Reliability Issues

Readers appreciate the features of Windows Mobile 5.0, but getting it to work consistently on most devices is difficult.

Set Access Control on Mandatory

Getting past the complexities in Windows Integrity Control.

Exchange 2007: Always On

Exchange 2007 comes equipped to let you use several high availability techniques.

Mobile Devices: Ready To Explode?

Mobile personal devices are very convenient, but often quite dangerous.

Hacker Defaces Microsoft U.K. Web Page

A hacker managed a rare feat Wednesday, successfully attacking a Web page within Microsoft's U.K. domain and replacing the page with several graphics related to Saudi Arabia.

Microsoft Security Worker Called Sixth-Worst Science Job

Employees who work in Microsoft's Security Response Center (MSRC) can breathe easy: they don't have the worst job in science. Just the sixth worst.

Masters of Disaster

Partners do their best to help customers survive the worst.

Ohio Gov.: Stolen Tape Had Taxpayer Info

A missing computer backup tape containing personal information on state employees also holds the names and Social Security numbers of 225,000 taxpayers, Gov. Ted Strickland said.

Cyber Attack Hits Pentagon

The Defense Department took as many as 1,500 computers off line because of a cyber attack, Pentagon officials said Thursday.

Swiss Internet Terror Trial Opens

A North African man and his wife went on trial Wednesday on charges they ran Web sites that supported al-Qaida-linked groups with videos of people killed by terrorists and information on how to make bombs.

Microsoft: Vista Has Fewest Vulnerabilities at 6-Month Mark

Windows Vista, in its first half-year of life, has proven to be an exceptionally secure operating system -- much more secure, in fact, than competing desktop OSes, according to Microsoft.

France Warns Officials on BlackBerry Use

BlackBerry handhelds have been called addictive, invasive, wonderful -- and now, a threat to French state secrets. That, at least, is the fear of French government defense experts, who have advised against their use by officials in France's corridors of power, reportedly to avoid snooping by U.S. intelligence agencies.

Image Attachments for Spam Decline

A common spamming technique of sending unwanted e-mail pitches as image attachments rather than text is on the decline, as spammers continue adapting their methods for sneaking past e-mail filters.

Tech Security Companies Are Hot Targets

For sale: A technology security company. Which one? Pretty much any of them.

Ohio Hires Expert To Review Data Theft

Ohio has hired a computer security expert to determine the likelihood of someone getting access to the data on a stolen backup storage device, Gov. Ted Strickland said Sunday.

AT&T Unveils Push To Stem Online Piracy

In a break with other Internet service providers, AT&T Inc. will work with Hollywood studios and recording labels to devise technology that identifies offshore content pirates who use its network to upload illegal copies of movies and music.

Subscribe on YouTube