(Go: >> BACK << -|- >> HOME <<)



Ads by TechWords

See your link here


Subscribe to our e-mail newsletters
For more info on a specific newsletter, click the title. Details will be displayed in a new window.
Networking Security
Networking
Computerworld Daily News (First Look and Wrap-Up)
Computerworld Blogs Newsletter
The Weekly Top 10
More E-Mail Newsletters 
Computerworld 2007Subscribe to Computerworld
40 years of the most authoritative source of news and information for IT leaders.
Identity Theft Protection
Total Protection from IDENTITY GUARD protects your identity

Permanent fix needed for DNS security issues, Kaminsky warns at Black Hat
Dan Kaminsky, the security researcher who discovered a major flaw in the DNS protocol last year, said this week that broad adoption of DNS Security Extensions technology may be needed to protect systems, despite its complexity. Read more...

Hackers exploit unpatched Adobe Reader bug

Conficker worm gets an evil twin

Hacker claims SQL bug on Symantec site; vendor disputes

HP, IBM push new OASIS encryption key standard

RIM releases patch for buggy ActiveX control

Verizon expands DoS defenses in 24 countries

Top 10 spam-friendly registrars named and shamed

Cisco warns of four WLAN controller vulnerabilities

Study: Data breaches continue to get more costly for businesses

More Network Security StoriesMore Top Stories

Database Crime Scene Prevention
A good detective understands the criminal mind, techniques, and tools of the trade. To protect your database and prevent it from becoming a crime scene, it is crucial to understand the common methods of attack, data theft, and cover up techniques. The suspect line-up can come from outside hackers and from within the ranks of trusted employees, contractors, and partners. Some threats are easily prevented or contained; while others more elusive. Fortunately, many of the security mechanisms and tools required to protect databases are readily available.

Security Vendor Breaches: Fallout Justified
Attendees at last week's ShmooCon security conference were transfixed when news broke that a hacker breached part of Kaspersky Lab's U.S. support site by exploiting a flaw in the site's programming.

Recession Makes IAM More Important Than Ever
Any economic downturn brings new risks to your organization. Nervous employees who fear downsizing may be tempted to gain unauthorized access to sensitive information stored across applications while temporary workers are less loyal and identity verification processes for full-time employees may not be used, making your organization more susceptible.

With global effort, a new type of worm is slowed
There have been big computer worm outbreaks before, but nothing quite like Conficker.

Online dating: Blocking the bad guys
Online dating sites go to great lengths to foil scammers, spammers, liars and cheats. We look at one technology aimed at improving detection.

Time to Tweak Microsoft's Patch Tuesday?
It's been about six years since Microsoft set aside the second Tuesday of each month as the day to release security patches, and most IT administrators have come to appreciate a consistent schedule to plan around.

A New Internet Attack: Parking Tickets
Trojan-pushing parking tickets? Yes, really. The Internet Storm Center, which tracks Internet attacks and threats, documented a case in Grand Forks, North Dakota where someone put yellow fliers on cars that claimed to ticket a parking violation. The fliers named a Web site that purportedly had pictures of your supposed violation.

The many flavors of carrier Ethernet
One of my favorite Mark Twain quotes is a riddle about semantics: If you call a dog's tail a leg, how many legs does the dog have? The answer: Four, because calling a dog's tail a leg doesn't make it one.

Rogue Firefox add-ons bring security risks
Security is as much about choices as it is about policies. Which software solution you pick is as important as how you configure and use it. With the vast majority of threats today coming from the Web, the choice of browser is critical. With few exceptions, most Web sites are cross-browser compatible. Choosing a browser is less about compatibility and more about usability and security.

Encrypted Drives Keep Your Files Safe
By now, the horror stories about missing external hard drives holding sensitive information have lost their edge. Whenever I hear that another 20,000 customers of some company are at risk of identity theft, I just roll my eyes. Yes, it's irresponsible for businesses, universities, and government agencies to lose so much. But it's also understandable: Until recently, encrypting data on a hard drive was a cumbersome process.

Ever wonder what powers eHarmony, Plenty of Fish, True.com and PerfectMatch.com? We peek under the covers at online dating sites.
Apple's office suite gets a number of evolutionary updates this year, along with iWork.com, Apple's take on Web-based document sharing.
Technology that will sync Amazon's Kindle 2 e-reader with a range of other mobile devices may open up a new world of interoperability.
Can interactive tools from the likes of WebMD and MayoClinic.com really find what ails you? Watch our video and see for yourself.
Get the latest news, reviews and more about Microsoft's newest desktop operating system
Find wage data for 50 IT job titles.
The End of Application Deployment
(Source: Citrix) Delivering Windows applications globally to remote offices and mobile users creates significant performance, security and management challenges. Learn how to reduce the cost of delivering them worldwide, on any network and on any device, while increasing security and performance.
More White Papers More White Papers
Sign up now for complimentary access to these upcoming Computerworld webcasts.
LIVE Feb 26, 2009 11:00 AM ET
E-mail Address:
(Required)
 Networking
 Networking Security
 Wireless Networking
 Networking Hardware & Devices
"The blogosphere regularly excoriates Microsoft for being a monopoly, but Google, not Microsoft, may be in the cross-hairs of the..." Read more Read More Blogs

"This company has a limited number of VPN connections, so IT sets up a terminal server gateway for some users..." Read more Read More Blogs

"One of the things I enjoy doing is talking with IT about the problems they are trying to solve with..." Read more Read More Blogs

"Mobile employees at this big international company already aren't entitled to a home office or use of a real office..." Read more Read More Blogs

More Networking Blogs More Networking Blogs
See all Computerworld Blogs See all Computerworld Blogs
Shark Bait
View Shark BaitFired up about IT? Join Sharkbait and share your true tales of IT. SharkBait is the place for you to sound off about everything IT – the good, the bad, and the rest of the weird stuff you deal with every day.

New baits
Shark Bait
The Impact of Social Networks on Mobility Strategies
The Impact of Social Networks on Mobility Strategies
Download this webcast, free, compliments of RIM.
Go to the webcast 
Computerworld Executive Briefing: Automating Network Management
Download this Executive Briefing now (a $195.00 value), compliments of ProCurve Networking by HP.
(Source: Computerworld) This briefing looks at the basics of network management, which tend to get lost in the dizzying array of products and processes. It also examines new tools that are on the way to help IT executives deal with management in the new era of automation.Download this Executive Briefing now (a $195.00 value), compliments of ProCurve Networking by HP.
Download this executive briefing download
How to Tame Digital Content
Download this new white paper today!
(Source: Adobe) Although digital content can be efficient and dynamic, it also creates new challenges that often can't be addressed by implementing an (ECM) enterprise content management solution. Take a look at this whitepaper to see how organizations can avoid the frustrations that result when they try a turn-key approach to ECM.
Download this white paper go
White Papers
Read up on the latest ideas and technologies from companies that sell hardware, software and services.
Are Your Business Critical Applications at Risk?
Defining Business Analytics and Its Impact On Organizational Decision-Making
MarketVibe: The State of Data Governance in Enterprises Today
View more whitepapers 
Premier 100
For more information or to register, please visit premier100.com.

Storage Networking World (SNW)
For more information or to register, please visit snwusa.com.

Mobile & Wireless World (MWW)
For more information or to register, please visit mwwusa.com.

Infrastructure Management World (IMW)
For more information or to register, please visit imworldusa.com.

Business Intelligence Perspectives
For more information or to register, please visit biperspectives.com.

IT Executive Summits
For more information or to register, please visit itexecutivesummit.com.
See all events see all events