HomeCybersecurity

Cybersecurity

eEye Flags Another IE Code Execution Flaw

Microsoft Corp. on Tuesday confirmed it was investigating a new "high risk" vulnerability in the widely used Internet Explorer Web browser. The software giants acknowledgement...

Oracle Users Shrug at Security Woes

Along with Cisco Systems Inc., Oracle was a choice whipping boy at last weeks Black Hat USA security conference. Regardless, Oracle users remained nonplussed...

Proofpoint, Voltage Team on E-Mail Encryption

Messaging security software developer Proofpoint has teamed up with Voltage Security to integrate encryption capabilities into its Proofpoint Protection Server software and Messaging Security...

Cisco Suit Settled but Debate Rages

An unsuccessful attempt by Cisco Systems Inc. and Internet Security Systems Inc. to quash discussion of security flaws in Ciscos Internetwork Operating System resulted...

Taking a Trip Down Denial

I find it fascinating how differently database administrators react to security alerts depending on the platform they support. There is clearly a caste system...

Flaws Found in MySQL Tracking System

Flaws have been found in MySQL Eventum 1.5.5 and prior that allow malicious users to conduct cross-site scripting and SQL injection attacks.Eventum is an...

Greasemonkey Gets Security Makeover

A new beta of the popular Greasemonkey browser extension has been released to fix a well-known—and potentially dangerous—security vulnerability. The security upgrade comes less than...

Where Does Truth Lie in Lynn/Cisco Case?

Theres general agreement among security researchers that disclosure of security vulnerabilities is a good thing. There isnt, however, agreement in the industry as to...

Apples Tiger vs. Windows Vista: Who Comes Out Ahead?

When Windows Vista ships in late 2006, Windows will mimic many features of Apples Tiger and go beyond it. But while Microsoft introduces the world...

Cisco Comes Clean on Extent of IOS Flaw

LAS VEGAS—Cisco Systems Inc. on Friday confirmed that a security hole in its Internetwork Operating System could be exploited by remote attackers to execute...