HomeCybersecurity

Cybersecurity

Patriot Act Hits Rocky Road to Renewal

The course that congressional leaders followed last week to extend controversial domestic spying powers of the USA Patriot Act was never animated on "Schoolhouse...

Vulnerabilities Are Everywhere

Two of every three computers are running software that contains a critical security hole, according to statistics released by vulnerability scanning company Qualys Inc. The...

Navigating the Backup and Recovery Maze

Backup systems have come a long way from the days when they were seen merely as expensive insurance policies for data. During the past...

CA Suite Merges Security and Backup Management

Computer Associates International Inc.s Business Protection Suite r2 merges security with backup management in a neat suite—sought-after functionality that should help IT managers at...

Highly Critical Flaw Found in Google Mini Search Appliance

Search engine darling Google Inc. has issued a patch to cover a range of potentially dangerous security flaws in the enterprise-facing Google Mini search...

Tough Decisions: Heuristics and Threats

I only partly agree with Bruce Schneier when he criticizes the anti-virus industry for not finding the Sony rootkit for all the months before...

EFF Takes Action Against Sony BMG

The Electronic Frontier Foundation filed a class-action lawsuit against Sony BMG Entertainment on Monday through which it is demanding that the company further address...

Dell to Ship Wave Security Software on New PCs

Dell Inc. will bundle security software from Wave Systems Inc. on future business PCs equipped with the Trusted Platform Module, a secure computing chip,...

Zero-Day Exploit Targets IE

Exploit code for a critical flaw in fully patched versions of Microsoft Corp.s Internet Explorer browser has been released on the Internet, putting millions...

Federated Identity: More Security Products Take Home Passing Grades

The Liberty Alliance announced Monday that IBM, NEC, NTT and RSA Security have passed Liberty testing for the Security Assertion Markup Language 2.0. IBM, NEC,...