Security

AT&T Launches Smart Grid Despite Hacking Concerns

Security consultants have engineered a worm which can bring down smart grids - while AT&T launches a product and the…

16 years ago

Panda Updates Hosted Security Application

Panda says the updated release is up to 50 percent more efficient than traditional endpoint security

16 years ago

Adobe: Consider the Alternatives

With Adobe releasing further patches and vulnerability updates for Acrobat and Reader, the question has to be asked, is it…

16 years ago

Widespread IT Broadens The Attack Surface

Threats are growing, and companies simply do not have the option to ignore the problem. This will drive a more…

16 years ago

Free Security Analyser from Microsoft

Microsoft to launch open-source security analyser for application developers.

16 years ago

Microsoft IE8: An Essential Upgrade

Some features catch up with rival browsers, others add new abilities and security functions. If you are an IE user,…

16 years ago

Microsoft Releases IE8

Security, ease of use, and improvements in RSS, Cascading Style Sheets and AJAX support are key priorities for Internet Explorer…

16 years ago

IBM/Sun: The Technology Fall-Out

If the merger goes ahead, IBM will have to make choices: Which database, which directory, and which virtualisation technology?

16 years ago

Recession Or No, We Are In It For The Long Haul

While all around are making short term decisions, you have to keep you head, and make sure your long term…

16 years ago

New Technologies vs Business Security

Social Networking and Cloud Computing are proving a headache for organisations.

16 years ago

GFI LANguard 9.0: Network and Security Scanner for SMBs

GFI LANguard network vulnerability and patch management software is most useful to SMBs.

16 years ago

Malware Uses Geo-location To Lure Victims

The minds behind the Waledac botnet are using the physical location of victims' machines in a scheme to lure them…

16 years ago

How To Keep Control Of Employee-Owned PCs

Employees are increasingly using personal PCs in their jobs, and IT staff have to support them. eWEEK Labs explores some…

16 years ago

“British Botnet Corporation” Should Apologise

What the BBC did was wrong. The corporation should stop defending its botnet antics, and act responsibly

16 years ago

BBC Defends Botnet Purchase

Programme makers claim that use of illegal networks was justified

16 years ago

Latest Version Of Firefox Being Developed

Mozilla has released its Firefox 3.1 beta 3 Web browser, intended for developers and testers for evaluation and feedback.

16 years ago

NAO: Delays cost Prison Project £41 million

A plan to create a single UK database of prisoner records has spiralled to more than £500 million

16 years ago

BBC Accused Of Illegal Botnet Use

The minds behind BBC television program "Click" have inadvertently thrust themselves into an ethical quagmire.

16 years ago

Recession Could Be Fueling IT Security Threats

The last few months has seen a spike in hackers trying to steal data, researchers say

16 years ago

Firefox Had More Bugs Than IE and Safari Combined

Firefox surpassed IE in the number of bugs reported in the software in 2008, say security researchers

16 years ago

Ten Years of Worms Have Left Email Security In Tattters

In 1999 the Melissa worm announced a new kind of attack. Ten years later, the security industry is still catching…

16 years ago

IT must lead the way – eWEEK Europe UK

Video: IT is not just cleaning up its own act. It will be the driving force in allowing every sector…

16 years ago

eWEEK Europe launches in the UK

As the industry changes, a new resource has arrived to help IT professionals excel in their mission

16 years ago

Cisco Offers Cloud-Based Email Security

The network giant's hosted service has flexibility - but can it compete with existing players like Symantec and Google?

16 years ago

Netbooks Are A Security Risk

Low-cost laptops are vulnerable because many of them come without standard security software, according to experts

16 years ago

Security Pros Advise on Surviving the Adobe Flaw

With hackers circling round a flaw in Adobe Acrobat, security professionals have advice on how to survive till Adobe gets…

16 years ago

How Do We Stop Fast Flux Networks?

Botnets change quickly to avoid being taken down. Larry Seltzer assesses a move to combat them - and says more…

16 years ago

Beware Of Software Bearing Gifts

If your applications aren't behaving the way you expect, the problem may not be where you think. Peter Judge found…

16 years ago

Sacked Staff Steal Company Data

Sixty percent of people who lose their jobs take company data with them when they go, according to a study…

16 years ago

Adobe Flaw Won’t be Fixed For Two Weeks

Adobe has promised to fix a zero-day vulnerability which allows lets hackers seize control of users' computers - but the…

16 years ago