Pages

Thursday, August 04, 2005

PC Chips Get Pumped Up for Virtual Computers

How endpoint security works

Net criminals 'customise' attacks

Home Users Need To Plan For The Worst

THE ILLUSION OF SECURITY, THE IMPORTANCE OF PREVENTION Peace, security and prevention

FBI COMPLETES ITS PUBLIC KEY INFRASTRUCTURE PROGRAM - Press Release - August 3, 2005

Accidental IT: Setting Up SSL Connections

Under Siege in Dulles By New-Generation Hackers

Cryptography goes mainstream

Big Brother is watching out for hackers

Silent, deadly forms of phishing double

Worm hole found in Windows 2000

Hackers already aiming for Vista

Patches on the way for Windows flaws

Phishers Hack eBay

Security still underfunded

Auditing user accounts

VoIP Security Threats: Fact or Fiction?

VMware holds a virtual edge for remote access

Court orders CardSystems to retain breach information

Wednesday, August 03, 2005

Internet Attacks Increase in Number, Severity

The Internet Is the Safest Channel

Neither Rain nor Sleet nor Snow

Who Needs the Pen?

The Missing Defence Tool In Many Companies’ Security Policy

Lost, Stolen or Strayed - Computerworld

Lost, Stolen or Strayed - Computerworld

Warnings on the threat from within - Computerworld

CIOs Learn Very Little From Security Audits

Build Your Own Security Operations Center > August 1, 2005

The Grades That Vanished, and Some Other Threats to Students' Data

Hackers break into CU computers containing 36K records

Cisco Web Portal Password Security Compromised

IBM Security Attacks Up 50

Hacked: Who Else Is Using Your Computer?

Hackers cash in on 802.1x confusion - IT Week

Gartner: Bank card fraud too easy for phishers

Cybercriminals up ante with phishing and darkmail

Guidance on Mitigating Risks From Spyware

Survey: ID theft hard to shake off | Tech News on ZDNet

IT Security Profession Still Maturing, Survey Says

HIPAAction - Survey

Tuesday, August 02, 2005

If it isn't broken...

Mydoom, Zindos, and Doomjuice Worm Removal Tool

In Brief: MCI acquires Totality

Cisco flaw presentation spreads across the Web - ZDNet UK News

Agencies making little progress against cybervandalism

The good guys have to cooperate

Interior officials accused of covering up IT security flaws

How to develop a security training program that works

PHRACK #63 HAS JUST BEEN RELEASED

Phishers cash in on ATM cards

Security advice for enterprise-level WiFi

Enterprise End Users Increasingly Adopt Unsanctioned Network Applications that Put Their Organisations at Risk

Monday, August 01, 2005

Privacy bill calls

Trike - A Conceptual Framework for Threat Modeling

Research shows time-wasting by employees costs employers billions of dollars

DHL hit in massive IT heist

Banks on the defensive as hackers target identity theft

Hotel television infrared systems can allow hackers to obtain guests' names and room numbers

The Inside Story on Security Breaches

Google's Blogger Dev Network Defaced & Vulnerable

The sorry state of IM security

In-Q-Tel chief: IT security policies have become self-defeating

Memo to IT security: Think globally act immediately

Digital forensics moving from an art to a science

'Google hacking': Everything you want someone to know and more

Wireless access security tool moves past prototype stage

Cisco Is Shooting Itself in the Foot

Partners Offer Way to Build Web of Reputations

Sidebar: Backing Up the Backups - Computerworld

Sidebar: An Ounce of Prevention - Computerworld

Lost, Stolen or Strayed - Computerworld

Advice: What to do before an IOS disaster strikes - Computerworld

FDIC Warns Finance Firms on Spyware - Computerworld

Preventing Abuse of Social Security Numbers Will Prove Tricky, Experts Say

Cisco Statement on Federal District Court Injunction

iDEFENSE Labs Security Downloads