HomeCybersecurity

Cybersecurity

Lend Lease Constructs HighRise for Security

John Miles knew he had problems. For eight straight quarters, security auditors had pegged the network at his employer, global real estate and construction...

Law Firm Tackles Security Needs

For the law firm of Sonnenschein, Nath & Rosenthal, there was no catastrophic incident—no defaced Web site or data theft—that pushed IT administrators to...

Attackers Could Bypass XP SP2 Security Mechanisms

Microsoft Corp. on Monday confirmed it was investigating a claim by a Russian security researcher that two key security technologies built into Windows XP...

MySQL Bot Attack Thwarted

Last weeks sophisticated bot attack against Windows installations of the MySQL database engine has fizzled after DNS (Domain Name System) service authorities shut off...

More Evidence Spam Has Peaked

Several weeks ago I expressed skepticism at AOLs claims of substantial drops in spam coming into their network and delivered to their customers. I...

Bagle Worm Mutants Multiplying Fast

Almost a year after the first Bagle worm started squirming through e-mail in-boxes, anti-virus vendors are reporting a new wave of attacks with new...

Winamp Squashes Critical Security Bug

America Online Inc.s Nullsoft unit has quietly rolled out a new version of the popular Winamp media player to plug multiple critical flaws that...

MySQL Bot Attacks Windows Systems

Malicious hackers have launched a zero-day bot attack against default Windows installations of the MySQL database engine, infecting vulnerable systems at the rate of...

DoS Flaws Haunt BIND Server Software

The nonprofit Internet Systems Consortium has rolled out fixes for a pair of denial-of-service flaws in its BIND (Berkeley Internet Name Domain) implementation of...

Windows Anti-Piracy Program a Genuine Triviality

When Windows Product Activation was announced for Windows XP, the predictions from some were dire. Surely, it was argued, this onerous burden and the...