News

News

  • January 17, 2008 17 Jan'08

    Virus onslaught sickens smartphones

    Mobile viruses are still somewhat of an unknown, but their numbers have already reached the hundreds. Despite their rapid growth, experts say the severity of a mobile virus depends on how vicious it is and how fast it can spread.

  • January 17, 2008 17 Jan'08

    BlackBerry flaw highlights growing mobile device risks

    Mobile security issues have been making waves, and following a recently revealed BlackBerry vulnerability, it's time to take notice.

  • January 17, 2008 17 Jan'08

    Who, or what, is reading your email?

    According to a new survey, fear of data leaks has caused many large companies to hire staff specifically to read and analyze outbound employee email.

  • January 17, 2008 17 Jan'08

    When relationships end, so does security

    It is often said that the trusted user is any enterprise's greatest security threat. However, what defenses exist for the threat posed by the people who trusted users trust – girlfriends, boyfriends, spouses and significant others? As Edmund X...

  • January 17, 2008 17 Jan'08

    Messaging techniques spawn new security policies

    Gartner IT Security Summit: As people use a growing variety of messaging programs in the workplace, companies are being forced to create new policies to minimize crossover threats.

  • January 17, 2008 17 Jan'08

    WebEx addresses ActiveX flaw

    The Web conferencing leader has patched an ActiveX flaw that could have enabled an attacker to gain access to sensitive data.

  • January 17, 2008 17 Jan'08

    Customer vs. Bank of America: Who's to blame?

    Who will win a landmark case on customer data protection?

  • January 17, 2008 17 Jan'08

    Spam, phishing, IM attacks rise

    Malicious attacks using social engineering techniques are on the rise. While botnets may finally be forcing ISPs into the battle, enterprise security pros are working overtime on strategies to keep the threats at bay.

  • January 17, 2008 17 Jan'08

    Finjan: Attackers wild about widgets

    In a new report, security firm Finjan says the digital underground will have no trouble finding flaws to exploit in the widgets most Web users take for granted.

  • January 17, 2008 17 Jan'08

    Black Hat 2007: For financial firms, availability too often trumps security

    Researchers say startling weaknesses in key protocols such as FIX and an addiction to availability have left the financial services industry in need of a security wake-up call.

  • January 17, 2008 17 Jan'08

    Discarded hard drives can be dangerous

    A treasure trove of sensitive information can end up in the wrong hands if old hard drives aren't properly disposed of, one security expert warns.

  • January 17, 2008 17 Jan'08

    Banks prepare lawsuit over TJX data breach

    TJX will face a lawsuit from three New England banking associations as well as individual banks. The Massachusetts Bankers Association is inviting others to join the suit.

  • January 17, 2008 17 Jan'08

    Survey: Companies disregard data security breach risks

    Companies continue to lack a response plan and fail to implement appropriate encryption technologies, according to a survey of more than 700 IT executives and security officers.

  • January 17, 2008 17 Jan'08

    Data leakage problem tough to solve

    Companies are searching for ways to prevent sensitive information from slipping out of their networks, but various technologies to address the problem have their drawbacks.

  • January 17, 2008 17 Jan'08

    Time will narrow gap between physical, IT security

    The convergence of physical and IT security departments within the enterprise may be inevitable, according to some CISOs and analysts, but this union will take time to form.

-ADS BY GOOGLE

SearchSecurity

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

ComputerWeekly

Close