Officials in the United Kingdom now suggest that a cyberattack from purported White House e-mail accounts actually originated from China, and the perpetrator used a hoax e-mail address that resembled a White House account.
- By Alice Lipowicz
- 02/08/2011
Microsoft began 2011 with a light touch, but IT pros can expect a decidedly heavy February security update next Tuesday.
- By Jabulani Leffall
- 02/03/2011
Google is looking to reward those who can find a vulnerability in its Chrome browser.
Sentrigo Hedgehog DBscanner offers enterprise-class vulnerability assessment and security scanning for databases.
- By J. Peter Bruzzese
- 02/01/2011
Should IT support token-generated, one-time passwords for users on a network?
- By Readers of Redmond magazine
- 01/31/2011
Cloud backup is simple, if you remember to set it up in the first place.
Hackers go after your browsing sessions. Plus: Conficker worm is gone, but not forgotten; unrest in Egypt worries Microsoft, Cisco.
- By Jabulani Leffall
- 01/31/2011
Microsoft released Security Advisory 2501696 in response a scripting vulnerability in Internet Explorer that affects all versions of Windows.
A demonstration of an attack against an Apple iPhone at the Black Hat Technical Security DC 2011 Conference in Arlington, Va., demonstrated that software in many GSM-based smart phones contains vulnerabilities that could open the phones to remote exploits.
- By William Jackson
- 01/21/2011
Scammers have set their sights on tablets and smartphones, and away from Windows desktops, in response to rising consumer demand for mobile devices.
The cloud is the current Next Big Thing in computing, and the Next Big Thing in attacks could be a new breed of economic denial-of-service attacks intended to use up resources and drive up the cost of cloud computing, warns a senior security researcher at Adobe Systems.
- By William Jackson
- 01/20/2011
An analysis of the Stuxnet worm shows it to be a combination of sophisticated and flawed work, most likely the product of a partnership between several entities with varying levels of expertise and resources.
- By William Jackson
- 01/19/2011
As expected, Microsoft today released two security bulletins in its January security update.
- By Jabulani Leffall
- 01/11/2011
Microsoft plans to start the year with a light count of just two security bulletins in its January patch.
- By Jabulani Leffall
- 01/06/2011
Code that can exploit a Rich Text Format flaw in Microsoft Office has been published, according to a Microsoft announcement late last month.
- By William Jackson
- 01/05/2011
Token-based login technology has improved significantly, so what are you waiting for?
Microsoft released a security advisory today concerning Windows Vista, Windows XP and Windows Server 2003.
Microsoft's security team announced late last month that it is investigating two proof-of-concept flaws in Microsoft's Web-related software.
A former FBI consultant claims the FBI had backdoors installed in the OpenBSD operating system to allow the agency to eavesdrop on virtual private networks used by U.S. attorneys nearly a decade ago.
- By William Jackson
- 12/16/2010
Microsoft today announced that its Forefront Endpoint Protection (FEP) 2010 product is available for evaluation.