A high-risk buffer overflow vulnerability in Computer Associates International Inc.s eTrust Vet anti-virus engine could put users at risk of PC takeover attacks, the...
America Online on Tuesday confirmed the inadvertent suspension of an undisclosed number of Trojan-infected AIM screen names.
The company said its internal anti-SPIM (spam over...
A high-profile security research outfit on Tuesday warned that a newly discovered flaw in the Domain Name System protocol could be exploited remotely to...
New Boundary Technology Inc.s Policy Commander automates what can be the overwhelming manual task of maintaining security settings on Windows desktop, laptop and server...
A new timing attack against the AES algorithm can be used to extract entire Advanced Encryption Standard keys from remote servers.Daniel Bernstein, an associate...
Computer viruses and remote control programs called bots are adopting features from stealthy programs called rootkits to avoid detection, security experts say.New versions of...
Guardium Inc. and IPlocks Inc. are giving customers greater control over database SQL activity to better safeguard their data repositories from unrestricted access, tampering...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...