HomeCybersecurity

Cybersecurity

Security App Transcends Spam

Enterprises seeking to improve control of outbound and inbound e-mail are getting help in a new offering from anti-spam software developer Proofpoint Inc. Continuing a...

Defeating DPA Attacks

If the practice of security is the black art of the IT world, requiring esoteric knowledge and the ability to employ a bag of...

Is Gap Growing Between Security Haves and Have-Nots?

WASHINGTON—Patch management, compliance and vulnerability management all vied for the attention of attendees on Monday at the Computer Security Institutes annual Computer Security conference...

Prevention Methods Shore Up Wireless LAN Defenses

Security developers took more than a decade to move from intrusion detection to intrusion prevention in the world of wired networking. But in the...

CA, Others Attack Spyware

Recognizing the growing need for anti-spyware solutions in the enterprise, Computer Associates International Inc. on Monday announced new software designed to tackle unwanted spyware,...

App-Firewall Vendors Challenge Rivals to a Test

Things are getting a bit testy in the application-security market. Saying that theyre fed up with some security vendors claiming that their products protect against...

Crack Program Released for Wireless Nets

One year after a vulnerability in the Wi-Fi Protected Access encryption algorithm was reported, a proof-of-concept program for the attack has been released.The attack...

New Phishing Attack Uses Old IE Exploit

A new phishing attack is utilizing a vulnerability in Internet Explorer, patched early this year, to hide its true source. /zimages/2/28571.gifA serious hole in IE...

E-gold Tracks Cisco Code Thief

The electronic currency site that the Source Code Club said it will use to accept payment for Cisco Systems Inc.s firewall source code is...

What Threat Is Posed by Stolen Cisco Code?

Once again, hackers are trying to sell what they purport to be the source code for Ciscos PIX firewall. But it isnt clear that...