HomeCybersecurity

Cybersecurity

Security Flaws In WinZip Could Allow Attacks

WinZip Computing Inc. recently revealed that Version 9.0 of its popular WinZip file compression program is vulnerable to a variety of security attacks. The...

Sender ID Wars Heat Up

Has Microsoft blinked on its licensing requirements for Sender ID, making it more acceptable to the open-source community? Some open-source leaders and companies think...

Security Watch: Bots March In

The WatchLast week, Microsoft released a security bulletin reporting vulnerability in the graphics subsystem in Windows and a wide range of Microsoft products. This...

Kerberos Flaws Allow Access to Protected Networks

The Massachusetts Institute of Technology has disclosed a number of serious security flaws in the Kerberos v5 authentication system, the worst of which could...

Security Researchers Call for More Info from Oracle

Oracles first monthly rollout of patches threw security researchers into a tizzy Wednesday as they complained of a lack of information on which vulnerabilities...

Kerberos Holes Could Bring Serious Exploits

Researchers at the Massachusetts Institute of Technology have reported the discovery of several potential vulnerabilities in the Kerberos Key Distribution Center that could allow...

Core Library Flaws Ripple Through Internet

When I read about the serious vulnerabilities in the Kerberos v5 authentication system, one specific aspect of it caught my eye: The lesser of...

New Bagle Threat Spreading Quickly, Quietly

Like Bagle.AQ infected messages of two weeks ago, a flood of infected e-mails started hitting users mailboxes Tuesday bearing the subject line "foto", and...

Oracle Delivers First Monthly Patch Rollup

Oracle on Tuesday delivered its first-ever monthly rollup of security patches, addressing more than 30 vulnerabilities discovered by Next Generation Security Software Ltd. between...

We Owe Much to DES

It was a historic moment when, last month, the National Institute of Standards and Technology proposed withdrawing the Data Encryption Standard as an encryption...