HomeCybersecurity

Cybersecurity

Part Two: A Forensics Inquiry, Step by Step

In my first column on this subject, I introduced a set of seven guidelines for IT departments when considering the forensic investigation of a...

Dos and Donts of Forensic Computer Investigations

Investigating the contents of someones system, files and e-mail is a serious thing, not to be taken lightly. IT professionals who are unprepared for...

Novel Worms Burst onto the Scene: One Sniffs, Another Talks

Anti-virus companies are warning of a new variant of the Sdbot mass-mailing worm that installs a network sniffer in order to grab unencrypted passwords,...

Microsoft Graphics Bug Threatens Systems

Microsoft Corp. on Tuesday offered patches for two serious vulnerabilities in its products. One of the security breaches—taking advantage of the action from a...

BorderWare Firewall Fights VOIP Threats

BorderWare Technologies Inc. has joined Ingate Systems AB and others in providing an edge solution to the external threat problem in voice-over-IP PBXes. The Toronto-based...

IMlogic Launches Free IM, P2P Blocker

IMlogic Inc. on Tuesday launched a free tool to let enterprises detect and block the use of instant messaging, peer-to-peer file sharing networks and...

Microsoft Needs to Secure All Users—Period

In my Aug. 23 column, I stated that Windows XP Service Pack 2 was improving security for only 10 percent of Windows users while...

Instrumental McAfee Chief Steps Down

Stephen Richards, who is responsible for pulling McAfee Inc. out of a whirlwind of financial and legal troubles, said last week he will resign...

Symantec Guards Busy Nets

Symantec Corp.s Symantec Network Security 7160 network intrusion prevention appliance capably detects and stops attacks. Despite a limited number of activity reports and some...

Mozilla Nears Firefox Finale

Mozilla Firefox, the open-source alternative to Microsoft Corp.s dominant Web browser, is preparing for prime time with the first preview of its 1.0 release...