HomeCybersecurity

Cybersecurity

Dont Fear Internet Anonymity Tools

When I write this weekly column, Im anything but anonymous. My name, e-mail address and picture are displayed prominently, and it doesnt exactly take...

iDefense CEO Talks on Wholesaling Threat Intelligence

Security intelligence company iDefense Inc. makes its money by acting as a kind of wholesaler of information on security vulnerabilities, threats and exploit code. The...

eEyes Blink Has Spotty Vision

eEye Digital Security Inc.s new Blink centralized network and user endpoint protection software aims to protect user systems, including desktops and laptops. However, eWEEK...

SiteDigger Hunts for Google Hacks

With Google hacks being used to find everything from customer credit card information to security logs detailing problems in corporate infrastructure, companies need to...

McAfee Buys Security Consulting Firm Foundstone

After courting each other for months, both publicly and privately, McAfee Inc. and Foundstone Inc. on Monday finally decided to combine their operations. McAfee...

McAfee, Alcatel Tools Scope Nets for Rogue PCs

As worms and viruses continue to ravage the Internet, a security vendor and an infrastructure provider are employing new strategies to try to prevent...

System Uses CallerID Method to Beat Phishers

WholeSecurity has teamed up with auction provider eBay to announce a new technology that automatically sniffs out sites that could house so-called "phishing" attacks. Austin,...

Dealing with the SP2 Installation Fallout

Nobodys surprised by the application problems cropping up as users install Windows XP Service Pack 2. As I said in my last column, you...

CA Buys Anti-Spyware Vendor

Computer Associates International Inc. on Monday acquired PestPatrol Inc., one of the original anti-spyware vendors, for an undisclosed sum. The purchase is an interesting one...

Windows Your Way

One thing that makes Windows such an effective platform is its great flexibility: Nearly everything that (on the surface) seems to be hard-coded can...