-
Security A to Z: Wi-Fi
Date: 11/28/06
Keywords: no keywords
For all Wi-Fi has done to bring people online, it's also opened them up to potential risk.
Source: http://news.zdnet.com/2100-1009_22-6138750.html
-
Security A to Z: Two-factor authentication
Date: 11/28/06
Keywords: no keywords
Banks and other online financial institutions consider alternatives to the password.
Source: http://news.zdnet.com/2100-1009_22-6138707.html
-
Security A to Z: Rootkits
Date: 11/27/06
Keywords: no keywords
Hackers aren't the only ones using rootkits. The Sony fiasco brought the toolkits into the mainstream.
Source: http://news.zdnet.com/2100-1009_22-6138674.html
-
Security from A to Z: Neologisms
Date: 11/27/06
Keywords: spam
An inordinate number of new terms have been created to keep up with the dubious activities of spammers, scammers and their ilk.
Source: http://news.zdnet.com/2100-1009_22-6138651.html
-
Security from A to Z: Microsoft
Date: 11/27/06
Keywords: software
The software giant has created a hole that many software companies are gladly stepping in to fill.
Source: http://news.zdnet.com/2100-1009_22-6138623.html
-
Security from A to Z: Google
Date: 11/27/06
Keywords: security
Just picture what the search giant has to do to keep all that data private. Part of a series on hot security topics.
Source: http://news.zdnet.com/2100-1009_22-6138507.html
-
Security from A to Z: Cell phone threats
Date: 11/27/06
Keywords: security, virus
Are mobile viruses a real threat? As cell phone sales grow, the question is more pressing. Part of a series on hot security topics.
Source: http://news.zdnet.com/2100-1009_22-6138495.html
-
Security from A to Z: Federated ID
Date: 11/27/06
Keywords: security
This system aims to make it easier for people to manage logins across a number of digital resources. Part of a series on hot security topics.
Source: http://news.zdnet.com/2100-1009_22-6138475.html
-
Security from A to Z: Extradition
Date: 11/27/06
Keywords: security
Hacking is an international crime. Is extradition the right way for governments to go? Part of a series on hot topics in security.
Source: http://news.zdnet.com/2100-1009_22-6138467.html
-
E-mail gangs bombarding Britain with spam
Date: 11/27/06
Keywords: spam
Experts blame rise in spam on computer programs that hijack millions of home computers.
Source: http://news.zdnet.com/2100-1009_22-6138454.html
-
Security from A to Z: DDoS
Date: 11/27/06
Keywords: security, web
Denial-of-service attacks, which take down a Web resource, are used by digital blackmailers. Part of a series on hot security topics.
Source: http://news.zdnet.com/2100-1009_22-6138447.html
-
Security from A to Z: Botnet
Date: 11/27/06
Keywords: security, spam
These armies of zombie PCs are used by cybercriminals for sending spam. Part of a series on hot security topics.
Source: http://news.zdnet.com/2100-1009_22-6138435.html
-
Security from A to Z: Antivirus
Date: 11/27/06
Keywords: software, security, virus, antivirus
The lowdown on how antivirus software works and what it needs to do in the future. A section is a series on security basics.
Source: http://news.zdnet.com/2100-1009_22-6138424.html
-
Firefox, IE vulnerable to fake login pages?
Date: 11/22/06
Keywords: security
Flaw could enable attackers to compromise usernames and passwords, security researcher warns, citing exploit on MySpace.
Source: http://news.zdnet.com/2100-1009_22-6137844.html
-
Microsoft lawsuits reeling in alleged phishers
Date: 11/22/06
Keywords: no keywords
Company's 129 lawsuits filed in Europe and the Middle East over the past eight months include 97 criminal procedures.
Source: http://news.zdnet.com/2100-1009_22-6137804.html
-
Attack code targets zero-day Mac OS X flaw
Date: 11/21/06
Keywords: security
The unpatched security hole could be used by a remote attacker to compromise a vulnerable Mac, advisories say.
Source: http://news.zdnet.com/2100-1009_22-6137710.html
-
Small companies ignorant of security?
Date: 11/21/06
Keywords: no keywords
Former White House adviser Howard Schmidt warns that hackers aren't just going after big corporations, and small businesses must beware.
Source: http://news.zdnet.com/2100-1009_22-6137381.html
-
Check Point to buy Swedish security company
Date: 11/20/06
Keywords: no keywords
In $586 million deal, Israeli company picks up Protect Data and subsidiary Pointsec Mobile Technologies.
Source: http://news.zdnet.com/2100-1009_22-6137108.html
-
'Tis the season to send spam
Date: 11/20/06
Keywords: shopping
The volume of junk e-mail is spiking--just as consumers gear up for holiday shopping.
Source: http://news.zdnet.com/2100-1009_22-6136901.html
-
IBM to launch security software for small business
Date: 11/20/06
Keywords: software, security
IBM on Monday plans to unveil a scaled-down version of its federated security software to reach companies of up to 5,000 employees.
Source: http://news.zdnet.com/2100-1009_22-6136996.html