HomeCybersecurity

Cybersecurity

Securing Source Code Should Be a Priority

The efforts of the "Source Code Club" to sell the source code to Cisco firewalls may be despicable, but they may also be a...

What if Malware Programmers Were Better at Their Work?

Many assume that malware programmers are good programmers, and this isnt hard to understand. Its sort of like being impressed with a magician who...

Serious IE Hole Opens PCs Up to Attacks

US-CERT on Wednesday warned of a fresh hole in Internet Explorer that could allow attackers to take control of a PC via an HTML...

Does Microsoft Have the Right (Document Management) Stuff?

Microsoft has said little about its Windows Rights Management Services (RMS) directions since it launched RMS 1.0 a year ago. But on Thursday, Microsoft ended...

Wireless Eyes Watching Airport Security

With fears of terrorism still in the air, vendors at this weeks International Security Conference touted new surveillance technologies being used in transportation and...

Microsoft Gives a Heads-Up on Security Fixes

In its first use of a new policy on security-update disclosure, Microsoft on Wednesday announced that next weeks scheduled security updates for the month...

For Sale: Cisco Firewall Source Code

A group that earlier this year offered for sale the source code of a popular intrusion detection system now is selling what it says...

Bill Sends Spyware, Adware Purveyors Down Divided Paths

As adware and spyware companies hoping to do business in the United States clean up their act in response to the Internet Spyware Prevention...

Mac and Linux Not Immune to Viruses

Its easy for administrators and computing professionals to get frustrated with users for all kinds of reasons, but security has to be one of...

Blazing an E-Mail Audit Trail

With an ever-rising tide of corporate e-mail, companies face numerous difficulties as they attempt to meet regulatory requirements aimed at ensuring their e-mail communications...