HomeCybersecurity

Cybersecurity

App Developers Need to Redouble Security Efforts

PHOENIX—Most enterprise developers can recite various software architecture layers as though its the easy question on the computer science final exam: operating system, application...

Security Watch Letter: Inside the JPEG Virus

The WatchThe end of summer lull for viruses and worms continues. Were still seeing new versions of RBots, and a new Bagle, but nothing...

Authorize.Net Battles Extortion Attempts

Corey Mandell knew things werent good when he got the ransom letter. Mandell had experienced such things before, and he knew that Authorize.Net, a...

New Bagle Variant Raises Alarms

A new variant of the Bagle worm is showing more prevalence than usual, according to anti-virus companies. The new version is known by a variety...

The Next Great Worm Is Coming

Just when mass-mailer worms are becoming an endemic but utterly preventable problem, a whole new wrinkle is developing. Mass-mailer worms based on the Microsoft...

Windows JPEG Exploit Ventures into the Wild

The first example of a working program designed to exploit a bug in Microsofts GDI+ library—which allows malicious code to be run simply by...

Congress Ponders Cyber-Security Bills

As Congress clambers to wrap up its work for the year, cyber-security proponents are scrambling to ensure that the safety of data networks is...

Network Tools Give Global Data View

Network Physics Inc. will give network managers more ammunition in the battle to pinpoint the source of performance or security problems in complex networks...

Its Time for E-Governance

Many of us in the information technology industry are waking up to the fact that the government wants to be a big part of...

Feds Pressured on Phishing

WASHINGTON—As phishing scams, identity theft and other online schemes proliferate, the private sector is calling on the federal government to take a leadership role...