(Go: >> BACK << -|- >> HOME <<)



Ads by TechWords

See your link here


Subscribe to our e-mail newsletters
For more info on a specific newsletter, click the title. Details will be displayed in a new window.
Virus and Vulnerability Roundup
Finance
Security
Computerworld Daily News (First Look and Wrap-Up)
Computerworld Blogs Newsletter
The Weekly Top 10
More E-Mail Newsletters 
Computerworld 2007Subscribe to Computerworld
40 years of the most authoritative source of news and information for IT leaders.

Excel Bug Will Be Ignored on Patch Tuesday
Microsoft said last week that it plans to deliver three Windows security updates on Tuesday, one of them deemed "critical," but it will not fix an Excel flaw that attackers are now exploiting. Read more...

Unpatched PDF bug poses growing threat, say researchers

Mahalo CEO defends IT staffer who ran botnet before being hired

Botnet ringleader gets four years in prison for stealing data from PCs

Windows security patches coming next week

Microsoft: No patch for Excel zero-day flaw next week

California finds e-voting software had errors, data deletion functions

Judge kicks notorious spammer off Facebook

Survey: Most Oracle Shops Don't Mandate Use of Security Patches

Czech Firm, Cisco Bug Slow Global Internet

More Spam, Malware and Vulnerabilities StoriesMore Top Stories

Q&A;: 'We are willing to take that risk,' says CEO who hired convicted botnet leader
Jason Calacanis, CEO of Mahalo.com, defends his decision to allow IT staffer John Schiefer to continuing working at the search engine start-up even after discovering that he had pleaded guilty to running a botnet.

Windows security patches coming next week
Microsoft will release three sets of security updates next Tuesday, fixing at least one critical bug in its Windows operating system.

Layoff backlash: Five steps to protect your business from angry ex-employees
Laid-off employees can turn anger into revenge if they have access to internal systems. Here are five steps you can take to protect your company when layoffs loom.

Time to Tweak Microsoft's Patch Tuesday?
It's been about six years since Microsoft set aside the second Tuesday of each month as the day to release security patches, and most IT administrators have come to appreciate a consistent schedule to plan around.

Good IT salary news, plus scams, drugs and DTV
We're taking a break from (most) bad economic news this week. Among other things, a couple of new salary surveys struck encouraging notes.

A New Internet Attack: Parking Tickets
Trojan-pushing parking tickets? Yes, really. The Internet Storm Center, which tracks Internet attacks and threats, documented a case in Grand Forks, North Dakota where someone put yellow fliers on cars that claimed to ticket a parking violation. The fliers named a Web site that purportedly had pictures of your supposed violation.

Rogue Firefox add-ons bring security risks
Security is as much about choices as it is about policies. Which software solution you pick is as important as how you configure and use it. With the vast majority of threats today coming from the Web, the choice of browser is critical. With few exceptions, most Web sites are cross-browser compatible. Choosing a browser is less about compatibility and more about usability and security.

Google slashes the Internet
If the world ever needed proof that it's Google's Web and we just surf on it, we got it in spades last Saturday morning when the Search Engine That Roared declared the entire Internet one steaming fetid pile of manure.

Building a better spam-blocking CAPTCHA
CAPTCHA used to be an easy way for Web administrators to block spam bots. Then it became an easy way for malware authors and spammers to do their dirty work. Can CAPTCHA technology be repaired and redeemed?

FAQ: How to protect your PC against the Downadup worm
Security experts say it's the biggest worm attack in years. Downadup is downright nasty, leaving worried Windows users to wonder: 'How do I keep my PC from joining the ranks of the hacked?'

Apple's new browser offers a lot more than slick UI goodies; it's stable and smart, too.
Better browsers. Better standards. Better tools. So why are Web pages still breaking?
You can get a netbook for $99 if you buy a two-year subscription to AT&T;'s 3G service. Is it worth it?
With major updates across four of its five apps, Apple's newest iLife suite is well worth the $79 upgrade cost.
Get the latest news, reviews and more about Microsoft's newest desktop operating system
Find wage data for 50 IT job titles.
Brief History of Software as a Service, Modernizing Enterprise Software
(Source: Service-Now.com) SaaS is the next big step in the logical evolution of software. Just as businesses replaced the water wheel with electric power from a grid, IT and software have moved far beyond sneakernets, fat fingers, patches and CDs. But not every alternative to traditional software includes all of the benefits of true SaaS. For users to better ensure their business needs and goals are addressed, it's important to understand the differences between traditional software, software offered by Application Service Providers and the different flavors of SaaS. This paper will provide a brief history of SaaS.
More White Papers More White Papers
Featured Zone
Security and Compliance Zone

If you are faced with the complexity of meeting stringent privacy policies and continually changing government requirements, the new Novell® Compliance Management Platform will provide welcome relief. Only the Novell Compliance Management Platform integrates identity, access, and security information and event management technology to provide a real-time, holistic view of all network events across an enterprise. This tight integration eases implementation while creating the ultimate governance solution; ensuring business policy becomes automated IT practice.


Identity and Security Management and Strong Information Technology Governance: Novell's Solution Suite Automates the Approach to the Perfect Union

This IDC White Paper examines Novell's identity and security management (ISM) solutions and how these integrated offerings can play a key role in enforcing security compliance for enterprise organizations.

Success Story: New York City Transit

One of the top priorities of New York City Transit is to ensure that its employees have secure and timely access to information. With a Novell® solution, the agency has automated identity management for 85,000 users, giving 49,000 employees secure, single sign-on to applications and providing 36,000 retirees with online access to benefit information.

Balancing Security Against Productivity

What makes for great security? Is it about keeping the bad guys out or letting the good guys in? About detecting attacks or preventing them? Security is a balancing act of all three of these and requires a holistic, integrated approach. All three disciplines must interact automatically and seamlessly to ensure an effective level of service that enables good business.

View Entire Zone
E-mail Address:
(Required)
 Security
 Networking Security
 Virus and Vulnerability Roundup
 Security: Issues and Trends
 Infrastructure & Control
"Most useful link of the week may be from the federal courts in northern California -- one that spells out..." Read more Read More Blogs

"In the last few weeks I’ve seen an alarming number of clients have to “let go” of employee(s).  Because I..." Read more Read More Blogs

"Consultants are cheap, doggie treadmills are hot, the privacy law changes tucked away in the federal stimulus bill, and more...." Read more Read More Blogs

More Security Blogs More Security Blogs
See all Computerworld Blogs See all Computerworld Blogs
White Papers
Security and Trust: The Backbone of Doing Business over the Internet
Earning the trust of online customers is vital for the success of any company that requires sensitive data to be transferred over the internet. With VeriSign you can put technology in place to help your online business protect customer data and build consumer trust. Learn how with this white paper.
Download this white paper now! 
Featured Column
In SecurityIn Security
Stripping away the trappings of applications, systems and networks, information is the core asset of most organizations. Our columnist describes how asserting the importance of information governance is crucial to making that asset tangible, addressable and protected.

Click here to read the latest column by Jon Espenschied
Featured Column
The Spy FilesThe Spy Files
For Congress to do anything that helps protect consumers and the critical Internet infrastructure as a whole, it must pass laws that require proactive processes to protect computers, not that tell people how to deal with the resulting mess, says Ira Winkler.

Click here to read the latest column by Ira Winkler
Premier 100
For more information or to register, please visit premier100.com.

Storage Networking World (SNW)
For more information or to register, please visit snwusa.com.

Mobile & Wireless World (MWW)
For more information or to register, please visit mwwusa.com.

Infrastructure Management World (IMW)
For more information or to register, please visit imworldusa.com.

Business Intelligence Perspectives
For more information or to register, please visit biperspectives.com.

IT Executive Summits
For more information or to register, please visit itexecutivesummit.com.
See all events see all events

Symantec Report on the Underground Economy
The Symantec Report on the Underground Economy examines activity on underground economy servers observed by Symantec between July 1st, 2007 and June 30th, 2008. It includes analysis and discussion of the goods and services advertised, advertisers participating in the economy, the servers and channels that host the trading, and a snapshot of piracy activity observed.
Download this white paper 
Tolly Report: Symantec Endpoint Protection 11.0.3
Symantec's Endpoint Protection 11.0 provides faster processing for common functions such as opening and saving Word and PowerPoint files. This ability can improve the productivity and quality of experience for users. Find out how Symantec outperforms the competition, download the report now.
Download this white paper 
3 Steps to Protect Confidential Data on Laptops
Learn how to avoid being part of the one-third of security breaches that occur due to laptop theft. This report outlines specific steps to help you secure confidential data and minimize the impact of data loss resulting from stolen or missing laptops.
Download this white paper 
The Endpoint Challenge
Take the Endpoint Challenge and discover how your endpoint security solution compares to the protection your business needs
Take the Challenge