HomeCybersecurity

Cybersecurity

Council Calls for FACA Exemption

In the latest effort to encourage owners and operators of the nations critical infrastructure to hand over threat and vulnerability data to federal agencies,...

For IT, Its All About Defense

The bad guys are still winning. thats not a surprise to anyone who has been hit by a worm, a virus or a phishing...

Rootkits Sprout on Networks

Rootkits are becoming increasingly common on enterprise computer networks and are even being used to create undetectable download servers for pirated movies and MP3s,...

CA Boosts Protection for SMBs

Computer Associates International Inc. is reaching out to small and midsize businesses with a new line of software suites that integrate security, storage and...

As Threats Evolve, Defenses Must Adapt

Its Monday: time to pay your monthly credit card bill. A tech-savvy consumer, you log on, open your Web browser and surf to MBNA....

Microsoft Bakes Windows AntiSpyware into Vista

Microsoft has confirmed plans to bundle anti-spyware protection into Windows Vista, a move that is sure to raise eyebrows among competitors and possibly antitrust...

Microsoft Consults Ethical Hackers at Blue Hat

For the second year in a row, Microsoft Corp. invited a small number of hackers onto its Redmond, Wash., campus to crack the companys...

Can RFID Be Made Tamper Proof?

With so many retailers and manufacturers embracing RFID tracking throughout the supply chain, there is a strong assumption that an RFID label is still...

Smart Users Toe the Line on Patches

This weeks minor deluge of major patches to Windows reminds me of the complexity of the whole patching process, and the peril that comes...

MS Confirms Win2K Worm Hole Patch Is Buggy

Microsoft Corp.s patch for a worm-vulnerable security flaw in the Windows 2000 operating system is causing problems for some users. The software giant late Friday...