Security News & Reviews - Page 1424

More Security News

Microsoft Takes Security Defense

|
Microsoft's newfound security zeal is shaping up to become one of the company's main weapons in its ongoing antitrust battle.

EPIC Sues Ridge Over National ID Card Documents

|
The Electronic Privacy Information Center sues Tom Ridge and the Office of Homeland Security for access to documents related to the development of a national identification card program.

Sanctum Fortifies AppShield Firewall

|
Sanctum Inc. this week unveiled the latest version of its AppShield application firewall, adding several new features, including a rapid-deployment tool and a set of templates with predetermined security settings.

NetIQ Gives MOM Security Extension

|
NetIQ Corp. next week at Microsoft Corp.'s TechEd Conference in New Orleans will launch a security extension to the Microsoft Operations Manager along with a new release of its NetIQ Security Manager.

Pair of Office XP Bugs Uncovered

|
A well-known security researcher has released an advisory about--and exploit code for--two new unpatched flaws in portions of Microsoft Corp.'s Office XP application suite.

A Boost for E-Com Security

|
With last week's acquisition of Digital Signature Trust Co. by Identrus LLC, the possibility of a standard, secure payment and authentication system for banking and financial services moved a big step closer to reality.

Geekspeak: April 1, 2002

|
Social engineering gives worm more crawling power.

At Microsoft, Security Trumps App Compatibility

|
In a sea change of philosophy, Microsoft is working to put security ahead of not just features and functionality, but also legacy application compatibility.

IEs Handling of Cookies Flawed

|
A newly discovered flaw in the way that Internet Explorer handles Web site cookies could enable an attacker to view and edit a user's personal data contained in the cookies.

EPIC Gains in Records Battle

|
A federal judge has ruled that the nearly 2,000 pages of documents the bureau produced in response to EPIC's request under the Freedom of Information Act likely don't constitute all of the relevant material and ordered the FBI to conduct another search

Experts Debate Risks to Crypto

|
There is a growing debate in the cryptography community over whether the cryptographic keys used in dozens of applications should be considered compromised in light of a recent paper detailing a more efficient way of factoring large numbers

Enterprise Tech Videos