News
News Archive
-
March 07, 2005
07
Mar'05
Windows vulnerable to LAND attack
Security researchers say this type of attack leaves enterprise customers of popular Windows products open to a denial of service. There is good news, though.
-
February 28, 2005
28
Feb'05
Leading UK firms fail the Google test
Most top UK companies are spurning search engine optimisation and pay-per-click opportunities on the web with the result that...
-
February 25, 2005
25
Feb'05
Intel offers 64-bit desktop processors
Intel has introduced five processors for desktop computers using its Extended Memory Technology, EM64T, which supports hybrid...
-
February 24, 2005
24
Feb'05
Security Bytes: Cisco patch available for ACNS flaws
Workaround outlined for new php exploit. IBM issues patch for DB2 flaw. Payroll service goes offline to investigate security claims , and BoA loses personal data on customers.
-
February 22, 2005
22
Feb'05
Accommodating arrays
Modern storage arrays offer disk types to meet any need -- costly Fibre Channel (FC) disks for high-end applications requiring superior performance and availability, and lower-priced SATA disks for less-critical data. The arrays also come with mixed...
-
February 17, 2005
17
Feb'05
Do you speak geek: All hail e-mail!
Test your knowledge of e-mail security with this quiz.
-
February 15, 2005
15
Feb'05
Federal agency security still poor, but improving
Report cards give federal security a D-plus average, but the Homeland Security Department is still failing.
-
February 14, 2005
14
Feb'05
Local mirror
-
February 14, 2005
14
Feb'05
Local backup
-
February 14, 2005
14
Feb'05
Strategic Storage: DR planning blueprint
Developing a good disaster recovery (DR) plan is similar to good dental hygiene -- and almost as exciting. Similar to going to the dentist twice a year, you should also test your DR plan with the same frequency. Wait too long to clean up your plan ...
-
February 09, 2005
09
Feb'05
The Controversy of Hacking Books and Classes
Read this excerpt and download Chapter 1, Ethics of Ethical Hacking from Shon Harris' All-in-One Gray Hat Hacking.
-
February 08, 2005
08
Feb'05
Loop switch
Loop switch
-
February 07, 2005
07
Feb'05
SATA drives product roundup
<------No summary found------->
-
February 07, 2005
07
Feb'05
CEOs and CIOs split on IT success
Business and IT directors are still at loggerheads on key technology issues, according to a new survey by the Economist...
-
February 03, 2005
03
Feb'05
Expect 13 Windows patches, some critical
Microsoft will release patches Tuesday to fix critical security holes in Windows Media Player, MSN Messenger, Microsoft Office and Visual Studio.
-
February 02, 2005
02
Feb'05
Compressed files strike another blow to AV
The "alternative" .rar files are picking up where popular .zip files left off as attack vectors.
-
January 31, 2005
31
Jan'05
ID theft remains No. 1 worry
For the fifth straight year, the FTC said most complaints came from identity theft victims. And that's a problem for enterprises.
-
January 23, 2005
23
Jan'05
Cyberstorm chasers: The folks who look out for the latest Internet threats
They keep a 'round-the-clock watch on conditions in cyberspace. CTO Johannes Ullrich discusses the volunteer effort behind the SANS Internet Storm Center.
-
January 19, 2005
19
Jan'05
Sun develops Centera competitor
-
January 17, 2005
17
Jan'05
'Benevolent' NT4 patches a surprise to some
Microsoft's first security bulletins of the new year included fixes for the now-unsupported Windows NT Server 4.0. On a related note, administrators are cautioned to apply one of January's patches in a specific order to avoid problems.
-
January 17, 2005
17
Jan'05
Computer Weekly barred from briefing on national programme
The first media demonstration of new multibillion-pound NHS IT systems took place in Whitehall last week - but technology...
-
January 11, 2005
11
Jan'05
A 'critical' Patch Tuesday
Microsoft issues three security bulletins for January, two of them critical. Attackers have already exploited some of the vulnerabilities.
-
January 10, 2005
10
Jan'05
Security Bytes: George Mason U. hacked; new Trojans on the loose
Hackers steal personal data of more than 30,000 members of George Mason University. Two new Trojans emerge. BMC Software buys a Parisian company.
-
January 10, 2005
10
Jan'05
Security on a Shoestring: Creating Internet policies on the cheap
No matter how small the organization, it's impractical to stand over employees and make sure they properly use the Internet. So here's how to write a decent acceptable use policy, and make sure everyone abides by it.
-
January 05, 2005
05
Jan'05
New solutions for the zero hour
IT vendors are looking to fill the gap between when a virus first hits and when its remedy is released.
-
December 30, 2004
30
Dec'04
Archive: Bits & Bytes column library
Bits & Bytes column library archive -- 2003 to 2004
-
December 20, 2004
20
Dec'04
Fixes, workaround for Kerberos 5 vulnerability
A security hole could be exploited to launch malicious code. But there are fixes and a workaround.
-
December 19, 2004
19
Dec'04
Transforming the cybersecurity culture
Eleven New Year's resolutions can help employees at all levels empower the security function at their organization.
-
December 19, 2004
19
Dec'04
Security Bytes: Be aware of Google Desktop 'glitch'
Cisco acquires Protego; Hotmail switches to Trend Micro; Red Hat, Mandrakesoft and Gentoo fix flaws.
-
December 09, 2004
09
Dec'04
Data storage history quiz
We tend to take storage for granted these days, and expect bigger, better and faster performance out of our hardware and software. But did you know that storage has a long and illustrious history that started out not so big or so fast? Take our data...
-
December 08, 2004
08
Dec'04
The security lingo of 2004
This was the year of botnets, zombie PC armies and phishying online schemes.
-
December 05, 2004
05
Dec'04
Think Sarbanes Oxley extension changes things? Think again
-
December 01, 2004
01
Dec'04
Phreaks love Bluetooth
Bluetooth is becoming the vector of choice for next-generation phone phreakers to swipe files from other users, make calls or render mobile phones completely useless.
-
November 30, 2004
30
Nov'04
Botnets target the enterprise warn experts
Versatile and increasingly vicious bots will cause enterprises a lot of grief in 2005, security experts say.
-
November 21, 2004
21
Nov'04
Crash Course: Recovery
What good is backing up your data if you can't get it back? The goal of this Crash Course on recovery is to make sure you can effectively and efficiently recover data no matter what iteration of the lifecycle it's in. Included here are also hints on...
-
November 12, 2004
12
Nov'04
NTFS permissions
This excerpt from Chapter 5 of "The definitive guide to Windows 2000 security" discusses the advantages of using NTFS for access control.
-
October 31, 2004
31
Oct'04
Fast Guide: Storage Management
Managing your storage infrastructure has never been harder. Complex systems, unbelievable data growth rates and squabbling vendors are just a few of the issues hampering your ability to manage storage. This Fast Guide to storage management has ...
-
October 28, 2004
28
Oct'04
MoD may write off £200m Chinook helicopters
The Ministry of Defence could write off more than £200m spent on eight Chinook Mk3 helicopters.
-
October 27, 2004
27
Oct'04
Spamming the universe
-
October 26, 2004
26
Oct'04
IBM sharpens blades
IBM has announced new management tools and upgraded models of its HS20 and JS20 blade servers.
-
October 26, 2004
26
Oct'04
Clear double advantage
ClearSpeed Technology has doubled the performance of its high-performance computing co-processor for scientific workstations and...
-
October 18, 2004
18
Oct'04
Smaller companies installing SP2; larger firms not
-
October 08, 2004
08
Oct'04
First integrated children's system goes live
The first web-based system to help councils meet new legal requirements for information sharing among teachers, social workers...
-
October 04, 2004
04
Oct'04
Symantec offers bare metal restore software
-
October 03, 2004
03
Oct'04
Training for CISSP Certification: SearchSecurity.com's Security School
Study guides for each of the ten domains of the CBK for those preparing to take the CISSP exam or expanding their knowledge of security concepts and practices.
-
September 27, 2004
27
Sep'04
Fast Guide: iSCSI
If you need to come up to speed rapidly on iSCSI, you've come to the right place. In this Fast Guide, we touch upon the basics and then we walk you through the pros and cons of iSCSI and Fibre Channel.
-
September 27, 2004
27
Sep'04
Five steps to using the Kerberos protocol
This excerpt from "Windows Server 2003 security infrastructures" explains the basic Kerberos protocol as it is defined in RFC 1510.
-
September 26, 2004
26
Sep'04
Authorize.Net says it has 'learned' from attack
The credit card processing service was unprepared for the kind of attack it suffered last week, but it will use the experience to improve security.
-
September 23, 2004
23
Sep'04
Multiple strategies guard youth services agency
Major corporations aren't the only ones who need to protect confidential information, ward off spam and malware, and defend against intrusion. Local youth service agencies must do the same, with far smaller budgets.
-
September 22, 2004
22
Sep'04
Security Bytes: New .jpg attack imminent; CA agrees to pay $225 million for federal violations
Sanjay Kumar is indicted for securities fraud and conspiracy, while Authorize.Net is knocked offline by massive DDoS attacks.