HomeCybersecurity

Cybersecurity

Private Sector, Feds Team Up Against Phishing

When phishing emerged as a serious problem in 2003, many law enforcement agencies were caught off guard. The Internet boom had spawned special task...

Fresh Bagles Roll Into PCs

A series of new versions of the Bagle virus hit PCs last week, several of which attempted to install Trojans on infected machines.The viruses...

Software Makers Should Adopt Visas Security Standards

Chances are that if you drove to work this morning, your commute was uneventful. Automakers work diligently to ensure that your car performs reliably...

Phishing Is Big Business

The raid was like something out of a Michael Mann movie: Police in four Brazilian states swept through the homes and businesses of dozens...

Real Vulnerability Testing Tools Offer Actual Assessments, Not Just Hype

A good vulnerability assessment tool can stabilize the shifting terrain of threats to IT systems. But just about every configuration management, patch distribution and...

Data Thefts Reveal Storage Flaws

Recent high-profile thefts of sensitive data have enterprise IT executives looking hard at the relationships among storage, backup and security, even as vendors prepare...

Help! The Cell Phone Viruses Are Coming!

In the middle of 2004 we saw the first real cell phone virus, named Cabir. It was newsworthy because it was the first, and...

Worm Chatter Escalates on MSN Messenger

Anti-virus vendors report an increased chatter of virus activity on Microsoft Corp.s Microsoft Network messenger Sunday night through Monday. In what appears to be a...

Citadel to Adopt Usage-Based Pricing for Hercules Vulnerability Remediation Software

Citadel Security Software Inc. plans to move to a dramatically different pricing model with the next release of its Hercules software in May, CEO...

Microsoft Shows Off Prototypes to Blunt Network Attacks

Microsoft Research is showing off prototypes for two security projects aimed at containing zero-day Internet worms and thwarting malicious code execution attacks. At the companys...