HomeCybersecurity

Cybersecurity

CA Patches High Risk Anti-Virus Flaw

A high-risk buffer overflow vulnerability in Computer Associates International Inc.s eTrust Vet anti-virus engine could put users at risk of PC takeover attacks, the...

AOL Suspends Trojan-Infected AIM Accounts

America Online on Tuesday confirmed the inadvertent suspension of an undisclosed number of Trojan-infected AIM screen names. The company said its internal anti-SPIM (spam over...

Denial-of-Service Flaw Found in DNS Protocol

A high-profile security research outfit on Tuesday warned that a newly discovered flaw in the Domain Name System protocol could be exploited remotely to...

Preparing for Battle in the Next Security War

My intent was to write about the improving state of computer security. However, before starting, I had to clear up all the spew in...

As Seen on TV: Network Security

Its a tough world out there, full of bad people constantly trying to take down the forces of truth, justice and, of course, Internet...

Policy Commander Automates Windows Security Settings

New Boundary Technology Inc.s Policy Commander automates what can be the overwhelming manual task of maintaining security settings on Windows desktop, laptop and server...

Dont Bet on Computing Security

Im sitting across from a security guy who is supposed to be telling me how hes making the world a safer place, and hes...

New Attack Can Recover Complete AES Keys

A new timing attack against the AES algorithm can be used to extract entire Advanced Encryption Standard keys from remote servers.Daniel Bernstein, an associate...

Rootkits Spawn New Malware

Computer viruses and remote control programs called bots are adopting features from stealthy programs called rootkits to avoid detection, security experts say.New versions of...

Guardium, IPlocks Guard Against Database SQL Exploits

Guardium Inc. and IPlocks Inc. are giving customers greater control over database SQL activity to better safeguard their data repositories from unrestricted access, tampering...