HomeCybersecurity

Cybersecurity

E-Voting Expert and Critic Urges E-Vote Hacking

Harvard fellow Rebecca Mercuri at the recent Black Hat Security Conference called on hackers to analyze election system code and expose the flaws. There...

Reals Helix Move

RealNetworks Inc.s Helix DRM (Digital Rights Management) software has received FCC approval for secure playback and storage of digital broadcast content over a users...

Beware of Presidential Phishing Expeditions

Web and e-mail filtering company SurfControl Plc. has identified a pair of e-mail messages purporting to be from the John Kerry presidential campaign. The...

Govt, Enterprise Data Sharing Efforts Crumbling

Several years after the beginning of a widespread effort between public and private parties to create an environment that would allow broader dissemination of...

AIM Security Hole Opens Users to Remote Attack

Two security research and consulting companies have reported a vulnerability in the AIM (AOL Instant Messenger) program that could allow an attacker to run...

Microsoft Offers XP SP2 Download for IT Managers

Microsoft on Monday offered its Windows XP Service Pack 2 (SP2) for download by IT professionals and developers. The Windows XP Service Pack 2 Network...

Bagle Worm Variant Slips Through Defenses

Another variant of the ubiquitous Bagle worm is now making its way across the Internet, flooding in-boxes with infected Zip files. The newest member...

Open Source Not Ready for Anti-Virus

The anti-virus business is an interesting one. On the one hand, its amazingly competitive on a worldwide basis, even if Symantec dominates the U.S....

AirDefense, AirMagnet, Highwall Track Down Attacks

eWEEK Labs invited several vendors of overlay wireless intrusion detection systems to submit products for our tests, and three obliged. AirDefense Inc. submitted AirDefense...

AirMagnet Tends CBKs Wireless Networks

Nine months ago, Todd Little sat in a cafe with his laptop and was amazed by the number of wireless networks he could see....