HomeCybersecurity

Cybersecurity

Anti-Spyware Activists Seek to Recruit Advertisers

The nonprofit Center for Democracy and Technology wants blue-chip advertisers join the fight against shady practices by adware and spyware vendors. The public policy group...

Microsoft Tests Security Toolkit for Shared-Computer Users

Microsoft is readying a new security tool to add to its arsenal. The newest member of Microsofts growing security-focused product family is the "Microsoft Shared...

Vendors Look to Bridge Security Gap

Two security companies, Preventsys Inc. and Intellitactics Inc., announced new technologies at the Information Security Decisions show here that bridge the gap that exists...

Congress Questions Pending Spyware Bill

Even as they move rapidly toward taking action against malicious software programs in the next few weeks, federal lawmakers recognize that any move they...

State Employs GPS to Track Sex Offenders

Massachusetts authorities last week began using GPS technology to track some of the states sex offenders.According to published reports, the Department of Probation plans...

Infosec Needs to Avoid Repeating Past Patterns of Error

If you look at the shape of a mountain range, its often difficult to tell whether the image spans just a few hundred feet...

Information Security Show Highlights New Threats, Old Problems

Pinched by tough, new data-privacy regulations on the one hand and aging Internet protocols on the other, IT security administrators said they are struggling...

eSafe 5 Targets Drive-By Spyware Sites

A new version of Aladdin Knowledge Systems Ltd.s eSafe gateway security software promises to protect users from a host of Internet ills, including so-called...

IBM Unveils Tivoli ID Manager

IBM last week announced its new IBM Tivoli Federated Identity Manager, which will extend the reach of Tivolis identity and access management technology, allowing...

Imperva, Kavado Firewalls Lock Down Web Applications

Companies looking to avoid the disgrace of losing confidential customer data via a compromise of publicly accessible Web applications should seriously consider deploying a...