Archive
Browse the full archive of Computer Weekly online content - see our most recent articles listed below, or browse by year of publication.
2005 Stories
-
December 22, 2005
22Dec2005
News
Gaining access using application and operating system attacks
In this excerpt from Chapter 7 of Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, Second Edition, authors Ed Skoudis and Tom Liston explain how security professionals can use exploit frameworks to their ... Continue Reading
-
December 21, 2005
21Dec2005
News
Sony struggles to regain trust
The company is trying to mend a reputation bruised over its antipiracy practices. One advocate for online civil liberties explains why redemption is a long way off. Continue Reading
-
December 20, 2005
20Dec2005
News
Guidance turns investigative tools on itself
The forensics software firm says it was compromised by hackers in November. It's just one in a growing list of companies admitting to recent attacks or lax security. Continue Reading
-
December 18, 2005
18Dec2005
News
Trio of trouble: Malcode targets Windows, IM users
AV firms warn IT shops to guard against Dasher, Bagle and Banbra. Dasher targets a Windows flaw patched in October, while Banbra spreads through IM. Continue Reading
-
December 14, 2005
14Dec2005
News
Flaws reported in Trend Micro ServerProtect
Storage and security managers should be wary of vulnerabilities in the AV product that could enable a denial-of-service and malicious code execution. Workarounds are available. Continue Reading
-
December 14, 2005
14Dec2005
News
Hospital ditches EMC Centera for long-term archiving
UHCS in Augusta, Ga., is replacing its Centera archiving system from EMC with IBM's GMAS product after performance, reliability and cost issues forced it to seek alternatives. Continue Reading
-
December 14, 2005
14Dec2005
News
Roundup: 2005's 'curious malicious code'
These viruses, worms and Trojans sometimes escaped our notice. But it didn't get past one antivirus vendor, who rounded up some of the year's stranger offerings from the underground. Continue Reading
-
December 12, 2005
12Dec2005
News
Two Windows patches coming, IE fix uncertain
It remains to be seen whether the software giant on Dec. 13 will address an outstanding Internet Explorer issue that is currently the target of a malicious Trojan. Continue Reading
-
December 12, 2005
12Dec2005
News
Titan Rain shows need for better training
SANS says the Chinese-based attacks demonstrate the growing sophistication of hackers, and the need for IT admins who can articulate the dangers to execs. Continue Reading
-
December 12, 2005
12Dec2005
News
Experts: Encryption not a security cure-all
Encrypting data offers some protection, but secure applications require much more than cryptography. Experts weigh in on your security options. Continue Reading
-
December 08, 2005
08Dec2005
News
IP cloaking becoming a business necessity
Just by browsing your competitor's Web site, you might be giving away your company's most guarded secrets. Experts offer advice for countering the subterfuge and keeping secrets safe. Continue Reading
-
December 07, 2005
07Dec2005
News
Security pros gain ground in the board room
Executives are paying more attention to their IT security managers and taking more responsibility for online threats against their companies, according to a new study. Continue Reading
-
December 06, 2005
06Dec2005
News
Cybersecurity policy takes cooperation, trust, experts say
At the Infosecurity confab, experts explain why sharing information -- even when it's embarrassing -- is vital to securing not only corporations, but also the national infrastructure. Continue Reading
-
November 30, 2005
30Nov2005
News
Out-of-cycle IE patch may be imminent
Microsoft may release a critical Internet Explorer fix before the next Patch Tuesday, amid reports that malicious code is targeting a memory corruption flaw. Continue Reading
-
November 29, 2005
29Nov2005
News
By the numbers: The new SOX breakdown
SOX spending for 2006 is expected to be on par with last year but it's not quite dÉjÀ vu all over again. More dough will go to technology. Continue Reading
-
November 28, 2005
28Nov2005
News
Who owns and administers the internet's addresses?
Given that IPv4 addresses are a finite resource, we can expect concerns over their distribution to increase in the coming years. Continue Reading
-
November 28, 2005
28Nov2005
News
Step 6: Configuring wireless clients
With wireless networks proliferating it is a good idea to understand what it takes to build a VPN for a wireless gateway. Contributor and Microsoft MVP Brien Posey details the necessary steps in this step-by-step guide. Continue Reading
-
November 22, 2005
22Nov2005
News
Influential survey says security 'set back by 6 years'
Update: The SANS Top 20 vulnerability list for 2005 shows the bad guys attacking flawed apps and paying more attention to network holes. Continue Reading
-
November 21, 2005
21Nov2005
News
Wireless security: Public Wi-Fi could open security holes
A Michigan county is working to give everyone within its borders wireless Internet access. But when it comes to security, users are on their own. Continue Reading
-
November 20, 2005
20Nov2005
News
Wireless security crucial to railway safety
A transportation firm uses wireless technology to keep the trains running on time. But securing mobile devices isn't easy when they're spread across the globe. Continue Reading
-
November 16, 2005
16Nov2005
News
Step 3: GnuPG and WinPT: Setup
-
November 16, 2005
16Nov2005
News
Step 2: Public keypairs
-
November 16, 2005
16Nov2005
News
Wireless security: Companies deal with software updates
A health care provider found it could use wireless technology to dramatically boost patient care. But first it had to figure out how to deploy security updates over a wireless network. Continue Reading
-
November 16, 2005
16Nov2005
News
Step 4: Encrypting e-mail in WinPT
-
November 14, 2005
14Nov2005
News
Hackers installing keyloggers at a record rate
iDefense researchers have found that keylogger infections are up 65% over the year before, putting the private data of tens of millions of users at risk. Continue Reading
-
November 14, 2005
14Nov2005
News
Sony rootkit uninstaller causes bigger threat
Princeton researchers say a security hole that appears when users try to remove Sony's copy protection software presents an even greater risk than the original rootkit. Continue Reading
-
November 14, 2005
14Nov2005
News
Demand for development skills soars as firms seek business edge
Computer Weekly salary survey shows IT departments eager to secure skills for the future. Continue Reading
-
November 10, 2005
10Nov2005
News
Security Bytes: FTC cracks down on alleged spyware distributors
Patches fix serious RealPlayer flaws, IM malcode launches phishing attacks; Microsoft warns of Macromedia Flash flaw; Liberty Alliance pushes stronger authentication; FEMA data security is in question; patches fix Veritas flaws and TransUnion ... Continue Reading
-
November 10, 2005
10Nov2005
News
IBM targets SMEs with storage products
IBM has launched the first in a range of new storage products aimed at the SME market, following its link-up with Network Appliance. Continue Reading
-
November 09, 2005
09Nov2005
News
Trojans target Sony DRM and Windows
Security researchers track two new Trojan horses. One exploits the Sony DRM program. The other could possibly take aim at the Windows flaw Microsoft patched this week. Continue Reading
-
November 08, 2005
08Nov2005
News
Sony takes second stab at DRM patch
But a top executive's response to criticism over the company's use of rootkit technology has added fuel to the backlash. Continue Reading
-
November 06, 2005
06Nov2005
News
Hacking Windows: MSRPC vulnerabilities
In this excerpt from "Hacking Exposed, Fifth Edition: Network Security Secrets & Solutions," authors Stuart McClure, Joel Scambray and George Kurtz introduce MSRPC vulnerabilities and countermeasures. Continue Reading
-
October 24, 2005
24Oct2005
News
Reporter's Notebook: NYC 'controls the software industry'
At Information Security Decisions: a security "rock star" rages against the Microsoft machine; banging the drum for enterprise security; a sour note on zero-day exploits. Continue Reading
-
October 20, 2005
20Oct2005
News
Author delves into novel attack methodologies
Review of Silence on the Wire, a book about security attack methodologies such as passive fingerprinting. Continue Reading
-
October 19, 2005
19Oct2005
News
Elements of a data protection strategy
In this excerpt from Data Protection and Lifecycle Management, Tom Petrocelli addresses the importance of securing data for regulatory compliance and outlines the five components of a data protection strategy. Continue Reading
-
October 17, 2005
17Oct2005
News
How avian flu could threaten IT security
Experts say a potential bird flu pandemic could have a disastrous effect on IT infrastructures. But if companies plan well, those infrastructures could also help minimize chaos. Continue Reading
-
October 12, 2005
12Oct2005
News
Quiz: What's your infosec IQ?
We've collected our toughest questions to see how well you stand up to a challenge. Put your knowledge to the test and let us know how you do. Continue Reading
-
October 12, 2005
12Oct2005
News
Symantec fixes 'critical' Veritas flaw
Attackers could launch malicious code by exploiting a security hole in Veritas NetBackup servers and clients. But Symantec has released a fix. Continue Reading
-
October 10, 2005
10Oct2005
News
Don't discount software distribution sites as attack vectors
There's a potential downside to update sites, which offer virtually untapped riches to bad guys wanting to compromise your network. Just ask the author. Continue Reading
-
October 07, 2005
07Oct2005
News
Service approach will bring benefits to applications development says Gartner
Service-oriented development of applications (SODA) is the best way to approach globally distributed application development and maintenance, according to a new report by Gartner. Continue Reading
-
October 03, 2005
03Oct2005
News
How to break into a computer that is right at your fingertips
Stressing the importance of physical security, Joel Dubin explains how a hacker can bypass a BIOS password and break into a computer. Continue Reading
-
October 03, 2005
03Oct2005
Tip
Zoning 101: Why zone?
Zoning can offer a number of benefits for your SAN. This tip details the advantages of zoning and offers an explanation of the different methods. Continue Reading
-
September 29, 2005
29Sep2005
News
Find out how to bridge the communications gap
Communications between the business and IT will be the subject of the next meeting of the Computer Weekly 500 Club (CW500). Continue Reading
-
September 27, 2005
27Sep2005
News
Secure your extended enterprise
How do you achieve the fine balance between ensuring that there is truly free access to sensitive information, without sacrificing security? Continue Reading
-
September 26, 2005
26Sep2005
News
NHS trust creates wireless record
University College London Hospitals (UCLH) NHS Trust has created the UK's largest single wireless network to support 7,000 users across eight hospitals. Continue Reading
-
September 26, 2005
26Sep2005
News
IT spending at midsized companies: How much does size matter?
-
September 26, 2005
26Sep2005
News
Secure the interests of your extended enterprise
How do you achieve the fine balance between ensuring that there is truly free access to sensitive information and applications from both inside and outside the firewall, without sacrificing security? Continue Reading
-
September 26, 2005
26Sep2005
News
Gartner stresses SOA and WS importance
Leading analyst stresses importance of SOA and web services Continue Reading
-
September 22, 2005
22Sep2005
News
Who best to avert data security disaster: government or business?
People look to government to prevent catastrophe. But in the Information Age, some of those people, namely those working in IT shops, need to do their part to protect us. Continue Reading
-
September 22, 2005
22Sep2005
News
Telework key to surviving security disaster, expert says
Cybersecurity Industry Alliance Executive Director Paul Kurtz explains why telework may be crucial to surviving The Big One. Continue Reading
-
September 21, 2005
21Sep2005
News
Leave no trace: Understanding attackers' motives
This excerpt from Chapter 1 of "Rootkits: Subverting the Windows Kernel," explains the purpose of back doors and how hackers use them, as well as how stealth plays a major role in most successful attacks. Continue Reading
-
September 21, 2005
21Sep2005
News
IT infrastructure risks key to averting major cyberattack
Predictions of a cataclysmic disaster have been around for awhile. But one security officer cites reasons why the Internet can never be brought down. Continue Reading
-
September 21, 2005
21Sep2005
News
Catastrophic cyberattack unlikely, experts say
Predictions of a cataclysmic disaster have been around for awhile. But one security officer cites reasons why the Internet can never be brought down. Continue Reading
-
September 20, 2005
20Sep2005
News
SAS drives product roundup
Serial-attached SCSI (or SAS) drives offer significant storage capacity at a much lower cost, while maintaining reasonable performance. Find out who the vendors are in this market. Continue Reading
-
September 20, 2005
20Sep2005
News
Security tools help reduce insider threat.
-
September 20, 2005
20Sep2005
News
Insider threat seen as biggest data security issue
Whether they oversee physical or online defenses, security officers say the disaster scenario that scares them most begins with an insider with malicious intentions. Continue Reading
-
September 19, 2005
19Sep2005
News
Spy vs. Spy
Excerpt from Chapter 6 of Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day. Continue Reading
-
September 18, 2005
18Sep2005
News
Ensure that legal responsibilities are clear -- Especially when trouble strikes
Excerpt from Chapter 15 of Information Nation Warrior: Information Management Compliance Boot Camp. Continue Reading
-
September 18, 2005
18Sep2005
News
CCSP courses, exam changing next month
Those seeking Cisco's security credential and specialization in VPN, firewall and IDS will soon follow different curricula that better reflect the vendor's current product lines. Continue Reading
-
September 13, 2005
13Sep2005
News
Ethernet users given greater product interoperability
A new network hardware testing standard will encourage enterprises, service providers and telcos to adopt cheaper and more flexible Ethernet technology for data, voice and video connectivity. Continue Reading
-
September 13, 2005
13Sep2005
News
Ofcom liberates BT to offer bespoke pricing
Ofcom has announced proposals to allow BT to offer large business customers bespoke call prices, which should lead to discounts for some companies. Continue Reading
-
September 13, 2005
13Sep2005
In Depth
IT professionals set for annual charity sleep-out
Senior IT professionals are gearing up to on London's Embankment near Tower Bridge on Friday 23 September 2005. The aim is to raise more than £250,000 for disadvantaged children. Continue Reading
-
September 11, 2005
11Sep2005
News
VoIP turns up the heat on firewalls
New research shows that many organizations are increasingly concerned about VoIP security and plan to augment their firewalls within the next year, changing the landscape of the firewall market. Continue Reading
-
September 09, 2005
09Sep2005
News
Sponsor's Editorial - Making marketing more relevant
Responsys, a premier global provider of on-demand email and lifecycle marketing solutions, has announced Interact 5, the latest version of the company’s email marketing automation software. Continue Reading
-
September 06, 2005
06Sep2005
News
Firewalls can help or hurt, so plan carefully
-
September 05, 2005
05Sep2005
News
Which data backup software is best? - Page 2
-
September 05, 2005
05Sep2005
News
Which data backup software is best? - Page 4
-
September 05, 2005
05Sep2005
News
Which data backup software is best?
-
September 05, 2005
05Sep2005
News
Which data backup software is best? - Page 3
-
September 05, 2005
05Sep2005
News
IE 7.0 may usher in wave of RSS exploits
Experts warn that Web-feed enhancements in Microsoft's new Web browser may be just the thing crackers need to compromise networks and private data. Continue Reading
-
September 05, 2005
05Sep2005
News
Extending perimeters
The news that, up until 2006, 70% of successful wireless local area network (WLAN) attacks will be because of the misconfiguration of WLAN access points and client software is disquieting on a number of levels. Continue Reading
-
September 01, 2005
01Sep2005
News
Symantec glitch could expose user names, passwords
Symantec announced a fix for a flaw in AntiVirus Corporate Edition Friday afternoon. The security hole could be exploited to view user names and passwords. Continue Reading
-
September 01, 2005
01Sep2005
Tip
Archiving unstructured data
Companies must find ways to automate and simplify the process of archiving files and e-mail messages. ECM software addresses this large pool of unstructured data. Continue Reading
-
August 30, 2005
30Aug2005
News
Myfip's Titan Rain connection
LURHQ researchers say the Myfip worm is a good example of the malcode Chinese hackers are using in the so-called Titan Rain attacks against U.S. government networks. Continue Reading
-
August 30, 2005
30Aug2005
News
Antivirus can introduce dangerous network security holes into any OS
AV software is one of the most basic security steps available. It's also yet another gateway for security breaches. Continue Reading
-
August 30, 2005
30Aug2005
News
Passive fingerprinting: Applications and prevention
In this excerpt from the book Silence on the Wire, author Michal Zalewski discusses both malicious and beneficial uses for passive fingerprinting, and how to prevent successful passive fingerprinting on your network. Continue Reading
-
August 29, 2005
29Aug2005
News
Storage area network quiz
It's all about the storage area network (SAN) -- man. The more you know, the easier it is. Take our SAN quiz and find out where you stand as a SAN guru. Continue Reading
-
August 26, 2005
26Aug2005
News
High profile breach brings security to top of agenda
There’s nothing like an apparent breach at a global company to concentrate the mind when it comes to information and data security. Continue Reading
-
August 23, 2005
23Aug2005
News
HP sales boost as restructuring costs
HP reported a 10% increase in sales for the third quarter, and said it would spend $900m (£530m) on redundancy costs in the final quarter. Continue Reading
-
August 16, 2005
16Aug2005
News
Reduce risks of disaster recovery testing
Untested business continuity plans can leave your firm in the lurch, but taking down live environments is risky and complicated. Continue Reading
-
August 10, 2005
10Aug2005
News
Strategic Storage: Storage security -- Change old habits and stop data theft
-
August 06, 2005
06Aug2005
News
Trusted Computing Group releases server specs
The Trusted Computing Group released a new set of trusted server specifications it hopes will help vendors protect their platforms against security breaches. Continue Reading
-
August 02, 2005
02Aug2005
News
Raising risk prospects with a new SQL injection threat
"Inference attacks" could deliver up your so-called secure database to an attacker. Continue Reading
-
July 31, 2005
31Jul2005
News
Attack: USB could be the death of me
Seemingly innocent Universal Serial Bus driver bugs may allow device attacks that many won't see coming, according to Black Hat presenters. Continue Reading
-
July 28, 2005
28Jul2005
In Depth
VoIP and IPT are hot tickets for the IT industry
Voice over IP (VoIP) and IP telephony (IPT) are the hot tickets in the current IT industry. In the space of two weeks in late May and June 2005, two major European trade shows — VON 2005 and VoIP for Business —have each exhibited a welter of ... Continue Reading
-
July 28, 2005
28Jul2005
In Depth
Lost at sea: securing the channel
As attacks seem to proliferate almost unabated, it’s worrying to think that of the three interested parties in the security technology market — the technology makers, the technology sellers and the technology users—not everyone shares a common view ... Continue Reading
-
July 28, 2005
28Jul2005
News
Sarbox compliance costing companies
Companies’ required investments to attain compliance with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, according to the Information Security Forum (ISF). Continue Reading
-
July 27, 2005
27Jul2005
News
Combining technology and social engineering: Hacking behind bars
In this excerpt from Chapter 11 of "The Art of Deception: Controlling the Human Element of Security," authors Kevin Mitnick and William L. Simon begin a story that shows how social engineering can be used with technology. Continue Reading
-
July 27, 2005
27Jul2005
News
Cisco, Black Hat litigation comes to a close
The vendor and partner ISS settle their dispute over a presentation that resulted in criminal charges and cease and desist orders. Continue Reading
-
July 26, 2005
26Jul2005
News
VeriSign raises stakes in battle for threat intelligence
Not to be outdone by 3Com's "Zero-Day Initiative," VeriSign says it'll shell out more cash for hackers who provide vulnerability intelligence. Continue Reading
-
July 26, 2005
26Jul2005
News
Experts weigh in on spyware's defining moment
We asked IT professionals to review the spyware definitions proposed by a coalition of tech firms and security organizations. They found plenty of room for improvement. Continue Reading
-
July 26, 2005
26Jul2005
News
VoIP encryption to have 'Pretty Good Privacy
-
July 25, 2005
25Jul2005
News
HP attempts to reassures anxious customers on impact of job losses
-
July 24, 2005
24Jul2005
News
Authentication takes a bite out of spam
Network and messaging experts offer helpful ammunition for network managers waving the white flag in the battle against spam. Continue Reading
-
July 22, 2005
22Jul2005
In Depth
Riding the wave of change
CIOs can thrive as pace of change quickens, argues Des Lee Continue Reading
-
July 22, 2005
22Jul2005
In Depth
Business continuity keeps companies running
As we speak, it appears that disruption to IT services by the London bombings was minimised due to effective and realistic business continuity strategies. Sally Flood sees how you construct them. Continue Reading
-
July 21, 2005
21Jul2005
News
HP slashes jobs and shuts enterprise divison
HP has announced 14,500 redundancies and will close down its separate enterprise sales division as part of its attempt to streamline operations and cut costs. Continue Reading
-
July 21, 2005
21Jul2005
News
Users look for value boost from Microsoft licence rejig
Software Assurance needs to offer better support, say IT directors Continue Reading
-
July 21, 2005
21Jul2005
News
Sarbox draining corporate security budgets
Corporate investment to comply with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, according to the Information Security Forum (ISF). Continue Reading
-
July 21, 2005
21Jul2005
News
Can alcohol mix with your key personnel?
I persuaded our MD to hire a dedicated IT security expert. I am pleased with his work, but on several occasions he has smelled strongly of drink. How do I nip this in the bud? Continue Reading