Security


Symantec Seeks Partner Feedback

Partners of security giant Symantec Corp. will soon be able to give the company more feedback on its partner program.

It Comes Down to Faith and Trust

Snooping on your employees' e-mails -- that can't be good for morale.

A Ninja at the Gate

Messaging Ninja keeps a watchful eye on the e-mail moving in and out of your Exchange network.

DNS Security Basics: Part II

Joern shows you two more ways you can keep your DNS safe.

Attacks on Windows Flaw Rise

Hackers stepped up attacks Friday on computers running some versions of Windows

Microsoft Warns on New Windows Exploit

Microsoft on Thursday confirmed that it's investigating reports of a new attack exploit that targets one or more vulnerabilities in its Windows Animated Cursor handling implementation.

TJX: At Least 45.7M Card Numbers Stolen

More than two months after first disclosing that hackers accessed customers' financial data from its computers, discount retailer TJX Cos. has revealed that information from at least 45.7 million credit and debit cards was stolen over an 18-month period.

Amp'd Mobile Faces $100K Fine over Call Records Security

The Federal Communications Commission is proposing a $100,000 fine against Amp'd Mobile Inc., the wireless phone company aimed at the youth market, for failing to protect consumers' personal calling records from thieves.

Russian Faces Trial for Microsoft Piracy

A Russian school principal accused of installing pirated Microsoft software in school computers was ordered Tuesday to stand trial for a second time.

EU Considers RFID Privacy Rules

Privacy and security need to be built into radio frequency identification tags before they become widespread, the European Commission said, announcing it would publish guidelines later this year.

FullArmor Endpoint Policy Manager Ships

FullArmor announced it is shipping FullArmor Endpoint Policy Manager (FullArmor EPM), a management tool that automates the delivery, enforcement, and auditing of critical security policies on mobile, disconnected and unmanaged endpoint devices, such as guest laptops.

Degree Offered in Biometric Security

Todd Fortier is banking on the day when ATMs will be required to confirm a user's face, voice or thumbprint before spitting out cash.

Most Computer Attacks Originate in U.S.

The United States generates more malicious computer activity than any other country

Study: Most Computer Attacks Originate in U.S.

The United States generates more malicious computer activity than any other country, and sophisticated hackers worldwide are banding together in highly efficient crime rings, according to a new report.

Google To Adopt New Privacy Measures

Google Inc. is adopting new privacy measures to make it more difficult to connect online search requests with the people making them -- a thorny issue that provoked a showdown with the U.S. government last year.

Judge Drops Charges Against HP's Dunn

MS and F5 Ink Operations Manager Deal

Microsoft and F5 Networks announced Tuesday they have signed an OEM deal that will put Redmond’s System Center Operations Manager 2007 on F5’s management appliances.

Your New ID-Theft Worry? Photocopiers

Printers with data drives used for storing, reproducing copied documents can be security weak link if not protected.

Last Preparations Being Made for DST Bug

Normally the switch to daylight-saving time isn't a big deal, but this Sunday, Jeff Ronner has to put people on the case.

SEC Goes After Scam E-Mails on Stock

The Securities and Exchange Commission on Thursday suspended trading in 35 companies whose shares were touted in e-mail spam campaigns.

Subscribe on YouTube