HomeCybersecurity

Cybersecurity

Readers Respond: Why So Shy About Locking Down Systems?

Thank you, thank you, thank you for "Why So Shy About Locking Down Systems?" (July 25).Of all the articles that Ive seen about spyware,...

Symantec, Veritas Promise Compliant E-Mail Security

Symantec has taken a step toward integrating its security software with storage technology it acquired from Veritas, announcing its E-Mail Security and Availability Solution...

Building the IT Stack We Really Want

In an eWEEK column last autumn, I proposed "a new default: to configure system privileges from the bottom up, instead of starting with wide-open...

Appliance Guards Web Mail, FTP

As they struggle to comply with privacy and security regulations and to prevent insiders from leaking confidential data, some enterprises are seeking to monitor...

Security Firm May Stay Mum

The security research company responsible for discovering a software hole later used by the Slammer worm is considering an end to its policy of...

Spyware Researchers Discover ID Theft Ring

Spyware researchers picking apart one of the more notorious spyware programs have stumbled upon what appears to be a massive identity theft ring hijacking...

The Knowledge Trek

With at least some of his ashes soon to be placed in Earth orbit, the late James Doohan cant even be imagined to be...

LinuxWorld Focus Turns to Security

Looking to counter Microsoft Corp.s claims of security superiority, open-source software vendors are giving the battle against vulnerabilities top billing at this weeks LinuxWorld...

First Vista Virus Discovered? Not Exactly

Web reports claiming that the first Windows Vista virus has surfaced are misleading. On Thursday a report on the F-Secure Web site claimed the "first...

Microsoft Unwraps HoneyMonkey Detection Project

Microsoft has officially lifted the wraps off its Strider HoneyMonkey research project, designed to trawl the dark side of the Internet looking for Web...