HomeCybersecurity

Cybersecurity

Grid Computing Can Allow Security Threats

Security experts on Wednesday recommended that IT administrators clearly identify and understand the security risks associated with large-scale grid computing deployments. During Ziff Davis Medias...

Identity Management Critical for Organizational Success

Implementing a comprehensive identity management system is critical for success in the enterprise—a fact many corporate executives havent yet grasped, according to the chief...

Software Vendors Should Come Clean on Security Holes

Most people tend to agree with the old adage: Knowledge is power. But there are some groups that think knowledge is a bad thing—knowledge...

Blue Coat Cures Hospitals Spyware Ills

Daily life in most big-city hospitals is nothing like what you see on "ER," with doctors rushing around continually, dashing from patient to patient,...

Sybases Demands for Silence Raise Outcry

Security experts are expressing outrage over legal threats from Sybase Inc. aimed at preventing a British research company from publishing details of serious flaws...

Vendors Join Forces to Fingerprint Hacker Attacks

Struggling to cope with a dramatic rise in malicious hacker intrusions, a group of 18 network providers and ISPs on Monday announced plans to...

How Broken Is Norton 2005 Activation?

The record for feedback in my security blog easily belongs to the entry on the brief problem I had with activation of Norton Antivirus...

Phishing Dips into Yahoo IM

Further evidence emerged this week that phishing attacks are spreading far beyond e-mail inboxes. They also are using instant messages in the quest to...

Nude Pix Put Cops In a Fix

Forget Paris Hilton; heres a wireless security story thatll make ones heart pulsate the next time a cell phone or PDA lands in someone...

Microsoft Claims Security Win with New Development Rules

Microsoft Corp.s application of a mandatory "Security Development Lifecycle" for all its Internet-facing products has "significantly reduced" the number—and severity—of security vulnerabilities, according to...