HomeCybersecurity

Cybersecurity

Ciscos Black Hat Actions Spark Mixed Reactions

The wrangle between Cisco and a former ISS researcher has caused mixed reactions about responsible disclosure, Ciscos security patch policies, and even the strength...

DRM Branches Out in Real-World Rollouts

After years of pilot technology tests, big and small businesses are now launching real-world, commercial digital-rights-management deployments, said customers and vendors at this weeks...

Researcher Defends Decision to Spill Beans on IOS Flaw

A former Internet Security Systems Inc. researcher sued by Cisco Systems Inc. and ISS after he revealed the details of a serious flaw in...

Hackers Claim Crack of Microsoft Genuine Advantage Scan

Microsoft Corp. on Tuesday pushed its WGA program over the Internet, hoping to thwart users running illegal or pirated copies of Windows XP and...

Database Vendors Shouldnt Kill the Messenger

The billions of dollars companies shell out for database software so that their most precious corporate assets will be both available and secure create...

Opera Plugs Three Security Holes

Opera Software on Thursday shipped an updated version of its Opera for Windows Web browser to fix a trio of potentially serious security vulnerabilities. The...

Windows Vista Security Looks Promising

For several years, especially since Windows XP Service Pack 2, Microsoft has been tightening security in Windows and Internet Explorer. Its hard to see...

Partners Offer Way to Build Web of Reputations

Two organizations are joining forces to offer a service that enables Internet users to establish identities and reputations, allowing others to decide whether they...

Privacy Pioneer Promises Secure VOIP

LAS VEGAS—Phil Zimmermann, the celebrated cryptographer who created PGP (Pretty Good Privacy) for e-mail encryption, is taking a shot at securing VOIP communications. Zimmermann took...

Price War: iDefense Doubles Bounty for Security Flaws

LAS VEGAS—The decision by 3Com Corp.s TippingPoint division to pay for the rights to information on software vulnerabilities has triggered an immediate response from...