-
A call for rational discourse on identity theft
Date: 12/06/07
Keywords: no keywords
ID Analytics' Thomas Oscherwitz writes that while ID theft losses are dropping, the debate has become ever more shrill. The Federal Trade Commission last week announced the long-awaited follow-up to its 2003 Identity Theft Survey Report. The 100-page report boils down to one extraordinary finding: identity theft occurs...
Source: http://news.zdnet.com/2010-1009_22-6221615.html
-
Securing Microsoft: The next generation of security threats
Date: 12/05/07
Keywords: security, microsoft
Forget those widespread worms. Nowadays, limited-scale threats like targeted e-mail attacks are causing the most concern. The final segment in a series examining Microsoft's security strategy. Editors' note: This is Part 3 in a series examining how Microsoft's security strategy has evolved over the past decade. Part 1:...
Source: http://news.zdnet.com/2424-9595_22-178936.html
-
Google calls for users to report malicious sites
Date: 12/04/07
Keywords: software, google
The search giant is asking people to fill in an online form reporting malicious sites that are not already flagged. Google is hoping users of its search engine will report "bad sites" to help the company fight criminals exploiting its infrastructure in order to distribute malicious software. ...
Source: http://news.zdnet.com/2100-1009_22-6221301.html
-
Securing Microsoft: Inviting the hackers inside
Date: 12/04/07
Keywords: security, microsoft
In Part II of this series following Microsoft's security strategies, Microsoft reaches out to the security research community it once kept at a distance. This is part two in a series examining how Microsoft's security strategy has evolved over the past decade. Part 1: Securing Microsoft: From pain...
Source: http://news.zdnet.com/2424-9595_22-178674.html
-
Master 3-D messaging security
Date: 12/04/07
Keywords: security
They're everywhere. Secure Computing's Paul Henry says you need multi-dimensional security to fend off attackers, no matter where they come from. Commentary--Messaging security is starting to resemble the world of video games. And that’s a good thing. In the 1980s and for...
Source: http://news.zdnet.com/2424-9595_22-178689.html
-
Apple QuickTime exploit in the wild
Date: 12/03/07
Keywords: security, web
An active exploit has been seen by Symantec for a vulnerability that affects the latest versions of Apple QuickTime. Symantec has found active exploit code in the wild for an unpatched Apple QuickTime vulnerability. Researcher Joji Hamada wrote in Symantec's Security Response Weblog on Saturday that the...
Source: http://news.zdnet.com/2100-1009_22-6221098.html
-
Shorter URLs help phishers hook more victims
Date: 12/03/07
Keywords: security
Cybercriminals are shrinking host names of malicious sites to lend them an air of legitimacy, according to security researchers. Phishers are using shorter URLs for malicious sites in a bid to lend an air of legitimacy to threatening links. Internet Security Services, IBM's online-security division, claims to...
Source: http://news.zdnet.com/2100-1009_22-6221092.html
-
Securing Microsoft: From pain to progress
Date: 12/03/07
Keywords: security, microsoft
Here's part I of a three part special report that examines how Microsoft's security strategy has evolved over the past decade. Slammer and Blaster caused the darkest days at Microsoft. REDMOND, Wash.--With a measure of pain, Matt Thomlinson recalls the summer of 2003. "I remember buses pulling up...
Source: http://news.zdnet.com/2424-9595_22-178522.html
-
Microsoft launches Exchange Server 2007 SP1
Date: 12/01/07
Keywords: security, web, microsoft
New features should improve management, add support for Windows Server 2008, and lead to better mobile security, says Microsoft. Microsoft on Friday launched Service Pack 1 for Windows Exchange Server 2007. Features include additions to the Exchange management console, Outlook web access and disaster recovery. Disaster recovery...
Source: http://news.zdnet.com/2100-9584_22-6220993.html
-
The new battleground in cybercrime
Date: 11/30/07
Keywords: no keywords
Finjan CTO Yuval Ben-Itzhak writes that user data increasingly is driving "criminal-2-criminal" business. In an age where "data equals money," fortune has replaced fame as hackers' key motivation. Criminals are willing to pay top dollar for personal, financial, and corporate data collected by Trojans and other "crimeware." ...
Source: http://news.zdnet.com/2010-1009_22-6220766.html
-
Study: 'Huge jump' in Microsoft flaws since last year
Date: 11/29/07
Keywords: software, security, microsoft
The number of security holes found in Microsoft software between 2006 and 2007 has risen threefold, says vulnerability-scanning company Qualys. The past year has seen a massive increase in the number of flaws found in Microsoft software, according to vulnerability-scanning company Qualys. Between 2006 and 2007, there...
Source: http://news.zdnet.com/2100-1009_22-6220719.html
-
World faces 'cyber cold war' threat, report says
Date: 11/29/07
Keywords: security
About 120 countries are trying to use the Net as a weapon to target financial markets, government computers, and utilities, McAfee says. A "cyber cold war" waged over the world's computers threatens to become one of the biggest threats to security in the next decade, according to a...
Source: http://news.zdnet.com/2100-1009_22-6220619.html
-
Study: 'Huge jump' in Microsoft flaws since last year
Date: 11/29/07
Keywords: software, security, microsoft
The number of security holes found in Microsoft software between 2006 and 2007 has risen threefold, says vulnerability-scanning company Qualys. The past year has seen a massive increase in the number of flaws found in Microsoft software, according to vulnerability-scanning company Qualys. Between 2006 and...
Source: http://news.zdnet.com/2424-9595_22-178018.html
-
Insecurity in the digital world
Date: 11/28/07
Keywords: no keywords
Internet attorney Eric J. Sinrod examines what's become the soft underbelly of our increasingly electronic era. More and more, we are going paperless, with all sorts of information stored electronically. Of course, there are many advantages to maintaining information in electronic form. But this column is not...
Source: http://news.zdnet.com/2010-1009_22-6220520.html
-
Top 7 security trends for 2008
Date: 11/28/07
Keywords: security, spam
Sentrigo CTO Slavik Markovich predicts more top-down driven initiatives to plug real security gaps based on threats from insiders and hackers alike. Commentary--2008 will be marked by strides in more coherent, enterprise-wide IT security policy enforcement. In addition to battling with security threats such as data security, anti-spam and...
Source: http://news.zdnet.com/2424-9595_22-177880.html
-
Mission for James Bond's Q: Seek venture capital
Date: 11/26/07
Keywords: security
Global Security Challenge gives start-ups the chance to show off their real-life technologies Bond might find helpful. "Now pay attention, 007!" In the James Bond novels and films, it fell to technical expert Q to invent the gizmos and cunningly concealed weapons that helped the British spy...
Source: http://news.zdnet.com/2100-9595_22-6220072.html
-
Security chief asks Saudis to monitor Internet use
Date: 11/26/07
Keywords: web
Saudi intelligence agency to set up Web site where citizens can anonymously share suspicions about militants. Saudis should do more to help the government monitor use of the Internet to help fight Islamic militancy, intelligence chief Prince Muqrin bin Abdul-Aziz said on Saturday. "We want to teach...
Source: http://news.zdnet.com/2100-9588_22-6220003.html
-
Militants seen educated in online training camps
Date: 11/21/07
Keywords: security
Internet security expert says an al-Qaida site, for example, shows how to use weapons, carry out a kidnapping, and make bombs. The Internet has become a key teaching tool for Islamist militants who are using it to educate recruits in Internet training camps, crime and security experts said...
Source: http://news.zdnet.com/2100-1009_22-6219727.html
-
Israel launches antihijack pilot ID system
Date: 11/21/07
Keywords: security
Trial run of pilot-authentication system planned for next month; experts note limitations of approach. Israeli authorities plan to issue a new antihijack identification system to incoming aircraft that they say is foolproof, but some experts are not convinced it will plug all the security holes on the horizon....
Source: http://news.zdnet.com/2100-1009_22-6219690.html
-
Targeted e-mail attacks spoof DOJ, business group
Date: 11/20/07
Keywords: security
Security expert says latest attacks part of an escalating problem. Availability of toolkits, rise of social networks are making it easier for phishers. Images: Customized e-mail attacks Security experts warned this week of two separate e-mail attacks launched Monday that take aim at specific individuals within corporations....
Source: http://news.zdnet.com/2100-1009_22-6219559.html