HomeCybersecurity

Cybersecurity

Alliance Tackles VOIP Security Threats

As the volume of phone calls carried over IP grows, so does the threat of voice spam. From the perspective of those who hold...

Chinese Legal System Hinders IP Protection Efforts

If finding a software pirate is as simple as walking down the street and looking around for wheelbarrows, why is China—home of the largest...

Developing Securitys New Image

Federal agencies and contractors have until Oct. 27 to define a new standard of personal identification. Thats the deadline for compliance with the first...

Open-Source Databases Spreading Like Rabbits

Open-source database adoption has shot up 20 percent in the last six months, according to new research. Evans Data Corp.s Fall 2005 Database Development Survey,...

The Ultimate Privacy Argument Against RFID

Privacy arguments tend to be emotional, often expressed in terms of "security versus privacy." A new book out about the future of RFID goes far...

Symantec Testing Database Security Appliance

Symantec Corp. has deployed a database security appliance at seven pilot customer sites and could roll the product out to wider release next year. The...

AOL Ships Netscape Security Patch

America Online Inc. late Wednesday shipped a new version of its Netscape browser to correct multiple critical code execution vulnerabilities inherited from the Firefox...

The Evil Scientists vs. Cisco

As a security story told around the electronic campfire, this one is a doozy, almost archetypal. First of all, on one side theres a group...

Patch Deployment Problems Haunt Microsoft Again

For the second time in as many weeks, the MSRC has revised one of its "critical" security bulletins after some users complained of problems...

A Bad Week for Patch QA

I have a lot of experience in the software testing business, having been technical director at PC Magazine Labs, PC Week (now eWEEK) Labs,...