LAS VEGAS—The Federal Trade Commission is asking corporations to report incidents when they are victimized by spyware attacks, but some experts say the process of doing so puts businesses in a tricky position, where they must weigh the benefits of pursuing malware code distributors against the potential for legal recrimination. Speaking at a roundtable discussion […]
LAS VEGAS—AJAX technology is rapidly being adopted by online businesses to help boost the interactivity of their Web sites, but a long list of potential vulnerabilities introduced by inexperienced programmers could create a troubling security landscape for Web 2.0 technologies. Speaking at the ongoing Black Hat security conference being held here July 31 – Aug. […]
Even with the renewed scrutiny being given to government IT systems in light of the recent laptop theft at the Department of Veterans Affairs, officials working with the Environmental Protection Agency say the organization has significantly improved its security operations. Guided by a seven-year contract granted to services provider Computer Sciences Corp. in 2002, the […]
Authentium, which sells software development tools to security applications vendors, introduced a new product July 31 that promises to give banks and other online service providers the ability to create more secure Web-based transactions. Dubbed VirtualATM, the SDK (software developer kit) is aimed squarely at businesses looking to boost security of their online operations by […]
Its the call that no IT manager wants to receive, but one thats clearly ringing bells across the world of enterprise security: An employees laptop computer has been stolen, and it may contain sensitive data. As a spate of recent incidents make clear, laptop computer thefts and the related data exposure are a serious issue, […]
With the implications for losing a laptop computer to theft growing every day, companies must be prepared to respond to the theft of these machines and put strategies in place to protect both their sensitive information and their corporate images. Before the end of the current session, the U.S. House of Representatives is expected to […]
When security software maker Symantec acquired data storage vendor Veritas in July 2005 for $10.3 billion to diversify its products in the face of a slowing market for anti-virus software, the risks of the deal were well-outlined. Symantec, the worlds leading provider of anti-virus applications and security software, was betting its future on a marriage […]
Government officials in New York are warning 540,000 injured state workers that an outside contractor has lost a computer containing their personal data, including the employees names, addresses and social security numbers. State officials have sent letters warning the individuals affected by the data loss to be on the lookout for potential identity fraud, based […]
Security researchers at Symantec have published the second of three reports calling out potential security issues in Microsofts next-generation Vista operating system, this time taking a shot at several of the products user account control and privilege escalation features. According to the latest report, which follows a similar missive issued by Symantec in mid-July over […]
A new report from Symantec security researchers contends that Microsofts much-awaited Vista operating system could harbor a range of vulnerabilities that will make it less secure than previous iterations of Windows. According to research published July 18 by Symantec, in Cupertino, Calif., a number of Vistas software components, specifically a handful of protocols related to […]