HomeCybersecurity

Cybersecurity

Paying for Flaws: Undermining Security or Rewarding Good Deeds?

3Com Corp.s announcement that its Tipping Point division would start paying for the rights to security flaw information found by private researchers has reignited...

Grid Group Issues Security Requirements

In an effort to quash one of the strongest inhibitors to grid adoption in the enterprise, the Enterprise Grid Alliance on Monday released a...

Security Digest: Winamp, Skype, HP

Winamp Bug Could Bring Buffer OverflowIn a grim reminder of force of the Pod, Winamp was found this week to have a problem handling...

Patriot Act Reform Outreach Scuttled

Corporate America mobilized this week to break a nearly four-year silence on the FBIs expanded powers to demand sensitive customer information, but persistent cold...

Critical MySQL Flaw Found

A "highly critical" flaw has been reported in MySQL that can be exploited to cause a DoS (Denial of Service) or to execute arbitrary...

USB Devices Can Crack Windows

Vulnerabilities in USB drivers for Windows could allow an attacker to take control of locked workstations using a specially programmed Universal Serial Bus device,...

Oracle Confirms Holes in Two Latest Patch Sets

After releasing a patch earlier this month for a faulty April Cumulative Patch Update, Oracle Corp. now says its patched patch also needs to...

Why So Shy About Locking Down Systems?

The symptoms and sources of spyware are legion, but all spyware infestations spring from the same root. Whether these unwanted, annoying, sometimes harmful applications make...

Anti-Spyware: Layered Look Is In

While anti-spyware products vie for IT managers attention by trumpeting the ill effects and extreme difficulty of eradicating unwanted software, the age-old question of...

No One Fell Swoop for Spyware

While dedicated anti-spyware companies struggle to ramp up the underlying management tools that enterprises require to address the escalating spyware scourge, eWEEK Labs tests...