Security


Swiss Internet Terror Trial Opens

A North African man and his wife went on trial Wednesday on charges they ran Web sites that supported al-Qaida-linked groups with videos of people killed by terrorists and information on how to make bombs.

Microsoft: Vista Has Fewest Vulnerabilities at 6-Month Mark

Windows Vista, in its first half-year of life, has proven to be an exceptionally secure operating system -- much more secure, in fact, than competing desktop OSes, according to Microsoft.

France Warns Officials on BlackBerry Use

BlackBerry handhelds have been called addictive, invasive, wonderful -- and now, a threat to French state secrets. That, at least, is the fear of French government defense experts, who have advised against their use by officials in France's corridors of power, reportedly to avoid snooping by U.S. intelligence agencies.

Image Attachments for Spam Decline

A common spamming technique of sending unwanted e-mail pitches as image attachments rather than text is on the decline, as spammers continue adapting their methods for sneaking past e-mail filters.

Tech Security Companies Are Hot Targets

For sale: A technology security company. Which one? Pretty much any of them.

Ohio Hires Expert To Review Data Theft

Ohio has hired a computer security expert to determine the likelihood of someone getting access to the data on a stolen backup storage device, Gov. Ted Strickland said Sunday.

AT&T Unveils Push To Stem Online Piracy

In a break with other Internet service providers, AT&T Inc. will work with Hollywood studios and recording labels to devise technology that identifies offshore content pirates who use its network to upload illegal copies of movies and music.

FBI Pulls Plug on Several Botnet Hackers

More than 1 million computers -- possibly yours, too -- are used by hackers as remote-controlled robots to crash online systems, accept spam and steal users' personal information, the FBI said Wednesday.

Safari Beta on Windows Upgraded -- Already

That didn't take long. Just three days after releasing its first-ever browser to work on Windows, Apple Inc. has issued a patch to close some vulnerabilities.

Eligibility Expands for IE Web Certificate

Smaller and newer businesses will now be able to get security certificates that trigger a green address bar in Microsoft browsers under new rules ratified this week.

Bail Denied for Alleged 'Spam King'

A man accused of defrauding people through tens of millions of spam e-mail messages sent around the world was denied bail Wednesday.

Windows Server 2003 SP2 To Be 'Pushed' on Patch Tuesday

The next "Patch Tuesday" will also be "Upgrade Tuesday" for admins, as Microsoft releases Windows Server 2003 Service Pack 2 (SP2) through Automatic Updates.

OASIS Unfurls Standard for Digital Signatures

New standard provides better support for e-commerce and enterprise security.

Four Critical Fixes on Tap for Tuesday

The Microsoft Security Response Center (MSRC) plans to publish six security bulletins next Tuesday, according to Thursday's advance notification.

Study: IIS More Likely To Be Compromised

Apache and IIS are equally at fault for pumping malware into the wild, according to a new study.

Cisco Confirms OS Security Holes

Just when you thought it was safe to start planning your summer vacation, Cisco Systems Inc. recently alerted customers to a spate of new vulnerabilities in its Internetwork Operating System (IOS).

IIS7 Added to Server Core

Microsoft has added another "core" product, one that will make Web hosting companies and Web farm administrators happy: Internet Information Services 7.0 is now available as a server core installation on Windows Server 2008.

Study: Music, Tech Search Terms Riskiest

Search terms related to music and technology are most likely to return sites with spyware and other malicious code, a new study finds.

A 'Stirling' Release for Microsoft

Microsoft has done its part to contribute to security sprawl by releasing 10 new security and access products, under the umbrella designation of "Stirling."

Isolation Automation Exploration: Part II

Making an isolation group -- step by step.

Subscribe on YouTube