Network access control is a useless marketing buzzword; users and vendors should just get on with security management, experts have…
I've never really thought of myself as much of a seer, prognosticator or predictor of the future, but based on…
Microsoft has agreed that Windows 7 will generate a prompt if there is an attempt to change the user account…
Anti-virus vendors are getting more than 50,000 submissions of new malware per day now. How can the malware business be…
Italian officials charge Google Global Privacy Counsel Peter Fleischer with criminal charges of defamation and failure to exercise control over…
We all saw what the concentrated efforts of a group of politically minded hackers could accomplish in 2007 when Russian…
A human error caused Google users to received bogus security warning messages for many of the searches the performed for…
First Microsoft touts clickjacking protections in Internet Explorer 8, then a security researcher releases a proof of concept for a…
A new survey shows 44 percent of the wireless devices used by retailers are vulnerable to attacks by data thieves.…
Websense has acquired Defensio, a spam filtering service designed to protect blogs, social networks and other Web 2.0 sites. According…
A new variant of a Trojan is targeting users of pirated Adobe Photoshop CS4 software. The Trojan is related to…
Microsoft has introduced a release client version of its latest browser, Internet Explorer 8 (IE8), and the new iteration of…
Much has been written about the Conficker worm, also called "Downadup," in recent days. eWEEK has pulled together some general…
Security researchers are reporting that the Conficker worm virus, which preys on a recently reported vulnerability (MS08-067) in the Microsoft…
Apple updates QuickTime, fixing a number of remote code execution flaws. One security researcher expects malware writers to launch exploits…
Messaging and collaboration SAAS company Zoho updates its Firefox plug-in for Zoho Notebook to make it easy to import a…
It's still easy to try to steal an identity with false whois information. There are rules against it and ICANN…
A new variant of a worm that exploits a vulnerability patched by Microsoft in October has infected millions of users,…
ContentWatch's CP 300 security appliance offers very good content filtering, traffic shaping and anti-malware capabilities, as well as excellent reporting.…
The SRP feature in Microsoft Windows doesn't offer the same granularity of control or change management capabilities as whitelisting options…
Companies frequently don't like to think about business continuity, disaster recovery, the expense of hot sites or even off-site storage.…
Server virtualization has become a popular trend in enterprise IT. When migrating from a physical to a virtual environment, IT…
Database and application vendors may want to take a look at expanding their data masking capabilities as its relevance grows.…
The successful creation of a rogue certificate authority by security researchers using a colliding certificates attack demonstrates that if you're…
Security vendors such as Imperva and Guardium are increasingly tying security information management to database activity monitoring. The latest example…
Microsoft has repeated its warning to users to apply a vulnerability patch in their Windows Server service. A new variant…