As the industry changes, a new resource has arrived to help IT professionals excel in their mission
News Security
Cisco Offers Cloud-Based Email Security
The network giant's hosted service has flexibility - but can it compete with existing players like Symantec and Google?
Netbooks Are A Security Risk
Low-cost laptops are vulnerable because many of them come without standard security software, according to experts
Security Pros Advise on Surviving the Adobe Flaw
With hackers circling round a flaw in Adobe Acrobat, security professionals have advice on how to survive till Adobe gets round to fixing the underlying problem
How Do We Stop Fast Flux Networks?
Botnets change quickly to avoid being taken down. Larry Seltzer assesses a move to combat them - and says more could be done
Beware Of Software Bearing Gifts
If your applications aren't behaving the way you expect, the problem may not be where you think. Peter Judge found that familiar, trusted software may not be quite what it appears
Sacked Staff Steal Company Data
Sixty percent of people who lose their jobs take company data with them when they go, according to a study sponsored by Symantec.
Adobe Flaw Won’t be Fixed For Two Weeks
Adobe has promised to fix a zero-day vulnerability which allows lets hackers seize control of users' computers - but the patch will not be available till 11th March.
Experts Say Dump The NAC Word
Network access control is a useless marketing buzzword; users and vendors should just get on with security management, experts have said.
RFID Puts Us All at Risk
I've never really thought of myself as much of a seer, prognosticator or predictor of the future, but based on a column I wrote back in 2005, I may just have a future in the prediction field.
Microsoft Changes Windows 7 UAC
Microsoft has agreed that Windows 7 will generate a prompt if there is an attempt to change the user account control settings - in response to pressure from bloggers who claimed the planned OS was vulnerable.
Where Does Malware Come From?
Anti-virus vendors are getting more than 50,000 submissions of new malware per day now. How can the malware business be so productive? It turns out the numbers aren't really as big as all that.
Google Privacy Exec Facing Criminal Charges
Italian officials charge Google Global Privacy Counsel Peter Fleischer with criminal charges of defamation and failure to exercise control over personal data two years after Google posted a video depicting fellow students harassing a s ...
New ‘Hacktivism’ Highlights Growing Problem
We all saw what the concentrated efforts of a group of politically minded hackers could accomplish in 2007 when Russian attackers took a wide swath of Estonian Web sites offline in response to perceived affronts against the Russian nat ...
Google Search Engine Sends False Security Warnings
A human error caused Google users to received bogus security warning messages for many of the searches the performed for nearly an hour the morning of the 31st January. During that period users received erroneous warnings that their se ...
From IE 8 to Google Chrome, Keep an Eye on Clickjacking
First Microsoft touts clickjacking protections in Internet Explorer 8, then a security researcher releases a proof of concept for a clickjacking attack targeting the Google Chrome Web browser. Clickjacking, some say, remains an issue t ...
Retailer Wireless Devices Largely Unprotected
A new survey shows 44 percent of the wireless devices used by retailers are vulnerable to attacks by data thieves. And that's the good news. A year ago, the same Motorola survey showed 85 percent of retailers were sitting targets for d ...
Websense Buys Spam Protection for Social Web Sites
Websense has acquired Defensio, a spam filtering service designed to protect blogs, social networks and other Web 2.0 sites. According to Websense, the move is in response to the growing amount of spam and malicious content on social W ...
More Malware Targeting Users of Pirated Software for Mac
A new variant of a Trojan is targeting users of pirated Adobe Photoshop CS4 software. The Trojan is related to malware uncovered last week that was packaged with pirated copies of iWork '09.
Microsoft Goes After Clickjacking in IE8
Microsoft has introduced a release client version of its latest browser, Internet Explorer 8 (IE8), and the new iteration of the application includes several security improvements, including a noteworthy attempt to address the emerging ...
Cleaning Conficker: Keeping Your Network Safe from Windows Worm
Much has been written about the Conficker worm, also called "Downadup," in recent days. eWEEK has pulled together some general advice for protecting your systems from infection and remediating them should the worm slither by your defen ...
Conficker USB Worm Spreading Quickly
Security researchers are reporting that the Conficker worm virus, which preys on a recently reported vulnerability (MS08-067) in the Microsoft Windows server service, is spreading rapidly even as we speak.
Apple Plugs Security Holes in QuickTime
Apple updates QuickTime, fixing a number of remote code execution flaws. One security researcher expects malware writers to launch exploits via drive-by attacks.
Firefox Plug-in Lets Users Import Google Notebook to Zoho
Messaging and collaboration SAAS company Zoho updates its Firefox plug-in for Zoho Notebook to make it easy to import a Google Notebook to Zoho's cloud computing environment. The move is a shrewd one on the part of Zoho, which is lo ...
Whois Abuse Still Out of Control
It's still easy to try to steal an identity with false whois information. There are rules against it and ICANN pretends to enforce them, but I personally know that it doesn't really happen.
Millions Hit with Windows Worm as Infection Spreads
A new variant of a worm that exploits a vulnerability patched by Microsoft in October has infected millions of users, security researchers say. According to experts, the Conficker worm is using multiple mechanisms to spread.
ContentWatch Security Appliance Offers Filtering, Anti-malware
ContentWatch's CP 300 security appliance offers very good content filtering, traffic shaping and anti-malware capabilities, as well as excellent reporting. It also integrates with directory services such as LDAP to let businesses enfor ...
Testing Microsoft’s Windows Application Whitelisting Tool
The SRP feature in Microsoft Windows doesn't offer the same granularity of control or change management capabilities as whitelisting options from third-party suppliers, but there also are no extra licensing costs and it works well with ...
Business Continuity and Disaster Recovery: How to Prepare Your Business
Companies frequently don't like to think about business continuity, disaster recovery, the expense of hot sites or even off-site storage. But, if you can't afford to lose it, then BC/DR is for you.
How to Protect Data During a Virtual Migration
Server virtualization has become a popular trend in enterprise IT. When migrating from a physical to a virtual environment, IT professionals need to ensure that their company's data is protected, current and readily available.