Security News & Reviews - Page 1425

More Security News

Security Flaws in Popular FTP Daemon Exposed

|
The two weaknesses in versions 2.5.0, 2.6.0 and 2.6.1 of the server have been the subject of much discussion in the last few days on security mailing lists and Web sites and an exploit for one of the flaws has been making the rounds as well

Microsoft Issues Privacy Quiz

|
The tool takes the form of an interactive 10-question quiz that puts the user into one of six categories based on his answers

Nortel Looks to Ease Security Bottlenecks

|
Known collectively as the Alteon Security Cluster, the products include the Alteon Web Switch, Alteon Security Appliances and custom software

Stay Focused on End-Of-Year Priorities

|
If you are looking for the three it trends that will be the hallmarks for the rest of the year, you might want to keep the letter "s" in mind.

Security Has to Make Sense

|
Perhaps the worst thing about the post-Sept. 11 environment is the abandonment of cost-benefit analysis, or any analysis at all, in the rush to prove that one has taken every possible precaution.

IBMs Pearson: Time to Tackle Privacy Is Now

|
Recently, IBM formed a first-of-its-kind Privacy Management Council, to examine the technologies and management practices that will be needed to protect consumer privacy.

IBM, Loudcloud Expand Security Offerings

|
In an effort to capitalize on the interest in all things security, IBM and Loudcloud Inc. last week announced expanded security service offerings, with an emphasis on vulnerability assessment and intrusion detection.

Tool Measures W2K Security

|
Administrators who want to measure how well their Windows 2000 servers are secured will find a free security scanner from the not-for-profit Center for Internet Security a real help.

5 Steps to Enterprise Security - Step 3: Detection

|
Human touch turns log files into leads that block attacks on IT.

E-mail Worm Wreaks Havoc Over Holiday Weekend

|
Known as Badtrans.B, the virus infects PCs through several methods, but the most troubling aspect of the new worm is its ability to install a keystroke logger and a backdoor Trojan

Security Firms Scrutinize .Net Code

|
The review, conducted by Foundstone Inc. and Core Security Technologies, included a study of all of the platform's inherent security capabilities, such as code-access security, role-based and evidence-based security and the use of cryptography

Microsofts Latest Security Stab: Online Quiz

|
Microsoft on Tuesday launched a new Web-based tool designed to help Internet users set their level of online privacy.

Enterprise Tech Videos