|
Identity Theft Protection
Total Protection from IDENTITY GUARD protects your identity |
Permanent fix needed for DNS security issues, Kaminsky warns at Black Hat
Dan Kaminsky, the security researcher who discovered a major flaw in the DNS protocol last year, said this week that broad adoption of DNS Security Extensions technology may be needed to protect systems, despite its complexity.
Read more...
Hackers exploit unpatched Adobe Reader bug
Conficker worm gets an evil twin
Hacker claims SQL bug on Symantec site; vendor disputes
HP, IBM push new OASIS encryption key standard
RIM releases patch for buggy ActiveX control
Verizon expands DoS defenses in 24 countries
Top 10 spam-friendly registrars named and shamed
Cisco warns of four WLAN controller vulnerabilities
Study: Data breaches continue to get more costly for businesses
Database Crime Scene Prevention
A good detective understands the criminal mind, techniques, and tools of the trade. To protect your database and prevent it from becoming a crime scene, it is crucial to understand the common methods of attack, data theft, and cover up techniques. The suspect line-up can come from outside hackers and from within the ranks of trusted employees, contractors, and partners. Some threats are easily prevented or contained; while others more elusive. Fortunately, many of the security mechanisms and tools required to protect databases are readily available.
Security Vendor Breaches: Fallout Justified
Attendees at last week's ShmooCon security conference were transfixed when news broke that a hacker breached part of Kaspersky Lab's U.S. support site by exploiting a flaw in the site's programming.
Recession Makes IAM More Important Than Ever
Any economic downturn brings new risks to your organization. Nervous employees who fear downsizing may be tempted to gain unauthorized access to sensitive information stored across applications while temporary workers are less loyal and identity verification processes for full-time employees may not be used, making your organization more susceptible.
With global effort, a new type of worm is slowed
There have been big computer worm outbreaks before, but nothing quite like Conficker.
Online dating: Blocking the bad guys
Online dating sites go to great lengths to foil scammers, spammers, liars and cheats. We look at one technology aimed at improving detection.
Time to Tweak Microsoft's Patch Tuesday?
It's been about six years since Microsoft set aside the second Tuesday of each month as the day to release security patches, and most IT administrators have come to appreciate a consistent schedule to plan around.
A New Internet Attack: Parking Tickets
Trojan-pushing parking tickets? Yes, really. The Internet Storm Center, which tracks Internet attacks and threats, documented a case in Grand Forks, North Dakota where someone put yellow fliers on cars that claimed to ticket a parking violation. The fliers named a Web site that purportedly had pictures of your supposed violation.
The many flavors of carrier Ethernet
One of my favorite Mark Twain quotes is a riddle about semantics: If you call a dog's tail a leg, how many legs does the dog have? The answer: Four, because calling a dog's tail a leg doesn't make it one.
Rogue Firefox add-ons bring security risks
Security is as much about choices as it is about policies. Which software solution you pick is as important as how you configure and use it. With the vast majority of threats today coming from the Web, the choice of browser is critical. With few exceptions, most Web sites are cross-browser compatible. Choosing a browser is less about compatibility and more about usability and security.
Encrypted Drives Keep Your Files Safe
By now, the horror stories about missing external hard drives holding sensitive information have lost their edge. Whenever I hear that another 20,000 customers of some company are at risk of identity theft, I just roll my eyes. Yes, it's irresponsible for businesses, universities, and government agencies to lose so much. But it's also understandable: Until recently, encrypting data on a hard drive was a cumbersome process.
"The blogosphere regularly excoriates Microsoft for being a monopoly, but Google, not Microsoft, may be in the cross-hairs of the..."
Read more "This company has a limited number of VPN connections, so IT sets up a terminal server gateway for some users..." Read more "One of the things I enjoy doing is talking with IT about the problems they are trying to solve with..." Read more "Mobile employees at this big international company already aren't entitled to a home office or use of a real office..." Read more More Networking Blogs See all Computerworld Blogs |
New baits |
| ||||||||
| ||||||||
| ||||||||
|
About Us Advertise Contacts Editorial Calendar Help Desk Jobs at IDG Privacy Policy Reprints Site Map |
CIO IDG.net Computerworld Inc. is prohibited. Computerworld and Computerworld.com and the respective logos are trademarks of International Data Group Inc. |