Antivirus, firewall and IDS products
-
News
18 Dec 2024
Top 10 cyber security stories of 2024
Data breaches, data privacy and protection, and the thorny issue of open source security were all hot topics this year. Meanwhile, security companies frequently found themselves hitting the headlines, and not always for good reasons. Here are Computer Weekly's top 10 cyber security stories of 2024 Continue Reading
By- Alex Scroxton, Security Editor
-
News
13 Dec 2024
How AWS is protecting customers from cyber threats
Amazon Web Services reveals how its threat intelligence capabilities work under the hood to thwart cyber attacks and keep its customers’ data safe Continue Reading
By- Aaron Tan, TechTarget
-
News
11 Jul 2006
Critical flaws found in Excel, Flash Player
FrSIRT says holes in Microsoft's spreadsheet program and Adobe's media player could allow attackers to take control of affected machines and initiate malicious commands. Continue Reading
By -
News
10 Jul 2006
Security Bytes: Data breach affects 100,000 military personnel
Meanwhile: Phishers use a phone trick to dupe PayPal users; the PCI security standard will get more teeth and a survey illustrates an increase in security breaches Continue Reading
By- SearchSecurity.com Staff
-
News
26 Jun 2006
Dundee to teach ethical hacking BSc
A degree in ethical hacking will be on offer at a Scottish university from the new academic year. Continue Reading
By - News 13 Jun 2006
-
News
01 Jun 2006
BlueCat appliance offers rock-solid security
Hot Pick: The Adonis 1000 appliance bundles DNS and DHCP into an enterprise-class appliance for the centralized secure operation of network addressing. Continue Reading
By- Sandra Kay Miller, Contributing Writer
- News 07 Mar 2006
-
Feature
02 Mar 2006
Industry chiefs to declare war on for-profit cyber criminals
IT industry leaders reaffirm the importance of security to a digital economy beset by money-driven cyber criminals. Continue Reading
By- Brian McKenna, Senior Analyst, Business Applications
-
Feature
09 Jan 2006
Voicing concerns on Skype
Skype has blazed a trail in the Voice over IP arena; its popularity hasn’t gone unnoticed by the hacker community however Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
14 Dec 2005
Roundup: 2005's 'curious malicious code'
These viruses, worms and Trojans sometimes escaped our notice. But it didn't get past one antivirus vendor, who rounded up some of the year's stranger offerings from the underground. Continue Reading
By- Anne Saita, TechTarget
-
News
12 Dec 2005
Two Windows patches coming, IE fix uncertain
It remains to be seen whether the software giant on Dec. 13 will address an outstanding Internet Explorer issue that is currently the target of a malicious Trojan. Continue Reading
By- Eric Parizo, Senior Analyst
-
News
14 Nov 2005
Sony rootkit uninstaller causes bigger threat
Princeton researchers say a security hole that appears when users try to remove Sony's copy protection software presents an even greater risk than the original rootkit. Continue Reading
By -
News
06 Nov 2005
Hacking Windows: MSRPC vulnerabilities
In this excerpt from "Hacking Exposed, Fifth Edition: Network Security Secrets & Solutions," authors Stuart McClure, Joel Scambray and George Kurtz introduce MSRPC vulnerabilities and countermeasures. Continue Reading
-
News
24 Oct 2005
Reporter's Notebook: NYC 'controls the software industry'
At Information Security Decisions: a security "rock star" rages against the Microsoft machine; banging the drum for enterprise security; a sour note on zero-day exploits. Continue Reading
By- Michael S. Mimoso, Senior Editor and Anne Saita, News Director
-
News
20 Oct 2005
Author delves into novel attack methodologies
Review of Silence on the Wire, a book about security attack methodologies such as passive fingerprinting. Continue Reading
-
News
27 Sep 2005
Secure your extended enterprise
How do you achieve the fine balance between ensuring that there is truly free access to sensitive information, without sacrificing security? Continue Reading
-
News
26 Sep 2005
Secure the interests of your extended enterprise
How do you achieve the fine balance between ensuring that there is truly free access to sensitive information and applications from both inside and outside the firewall, without sacrificing security? Continue Reading
-
News
18 Sep 2005
CCSP courses, exam changing next month
Those seeking Cisco's security credential and specialization in VPN, firewall and IDS will soon follow different curricula that better reflect the vendor's current product lines. Continue Reading
By- Anne Saita, TechTarget
-
News
11 Sep 2005
VoIP turns up the heat on firewalls
New research shows that many organizations are increasingly concerned about VoIP security and plan to augment their firewalls within the next year, changing the landscape of the firewall market. Continue Reading
By- Eric Parizo, Senior Analyst
- News 06 Sep 2005
-
News
05 Sep 2005
Extending perimeters
The news that, up until 2006, 70% of successful wireless local area network (WLAN) attacks will be because of the misconfiguration of WLAN access points and client software is disquieting on a number of levels. Continue Reading
-
News
01 Sep 2005
Symantec glitch could expose user names, passwords
Symantec announced a fix for a flaw in AntiVirus Corporate Edition Friday afternoon. The security hole could be exploited to view user names and passwords. Continue Reading
By -
News
26 Aug 2005
High profile breach brings security to top of agenda
There’s nothing like an apparent breach at a global company to concentrate the mind when it comes to information and data security. Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
06 Aug 2005
Trusted Computing Group releases server specs
The Trusted Computing Group released a new set of trusted server specifications it hopes will help vendors protect their platforms against security breaches. Continue Reading
By- Luke Meredith, News Writer
-
Feature
28 Jul 2005
Lost at sea: securing the channel
As attacks seem to proliferate almost unabated, it’s worrying to think that of the three interested parties in the security technology market — the technology makers, the technology sellers and the technology users—not everyone shares a common view on the importance of the technology. Continue Reading
-
News
28 Jul 2005
Sarbox compliance costing companies
Companies’ required investments to attain compliance with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, according to the Information Security Forum (ISF). Continue Reading
-
News
24 Jul 2005
Authentication takes a bite out of spam
Network and messaging experts offer helpful ammunition for network managers waving the white flag in the battle against spam. Continue Reading
By- Amy Storer, News Writer
-
News
21 Jul 2005
Sarbox draining corporate security budgets
Corporate investment to comply with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, according to the Information Security Forum (ISF). Continue Reading
-
News
20 Jul 2005
Pop quiz: E-mail security
Find out how much you know about securing your organization's e-mail. Continue Reading
-
News
12 Jul 2005
Sarbox challenge drains security budgets
International corporate spending on compliance with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, according to the Information Security Forum. Continue Reading
- Feature 13 Jun 2005
-
News
05 Jun 2005
Quiz: Secure Web directories and development, answer No. 1
Quiz: Secure Web directories and development, answer No. 1 Continue Reading
-
News
05 Jun 2005
Quiz: Secure Web directories and development, answer No. 2
Quiz: Secure Web directories and development, answer No. 2 Continue Reading
-
News
04 Jun 2005
Life at the edge part 2: Divide and conquer with DMZs
Learn how a DMZ works and how it can protect Web servers. Continue Reading
-
News
03 Jun 2005
Quiz: Identify and analyze Web server attacks
Test your knowledge of the material covered in the "Identify and analyze Web server attacks" section of Intrusion Defense School. Continue Reading
-
News
02 Jun 2005
Quiz: Web attack prevention and defense
Test your knowledge of the material covered in Web attack prevention and defense, including the fundamentals of securing a Web server. Continue Reading
-
News
31 May 2005
Network configuration: IIS SMTP mail relay service and Microsoft Exchange Server
Learn how to use the IIS SMTP mail relay service to prevent spammers from directly interacting with your Microsoft Exchange Server. Continue Reading
-
News
16 Mar 2005
RootkitRevealer turns root kits' tactics back at them
A contributor reviews freeware RootkitRevealer from Sysinternals. Continue Reading
-
News
05 Jan 2005
New solutions for the zero hour
IT vendors are looking to fill the gap between when a virus first hits and when its remedy is released. Continue Reading
By- Jennifer Lawinski, News Writer
-
News
20 Dec 2004
Fixes, workaround for Kerberos 5 vulnerability
A security hole could be exploited to launch malicious code. But there are fixes and a workaround. Continue Reading
By -
News
30 Nov 2004
Botnets target the enterprise warn experts
Versatile and increasingly vicious bots will cause enterprises a lot of grief in 2005, security experts say. Continue Reading
By -
News
12 Nov 2004
NTFS permissions
This excerpt from Chapter 5 of "The definitive guide to Windows 2000 security" discusses the advantages of using NTFS for access control. Continue Reading
By- Paul Cooke
- News 27 Oct 2004
- News 04 Oct 2004
-
News
27 Aug 2004
Over-specify when buying low cost replacement for Frame Relay
A project manager reveals how a VPN saved £275,000 a year Continue Reading
By- Peter Skipwith
-
News
25 Jul 2004
Know Your Enemy -- Learning about Security Threats: Chapter 8, Legal Issues
Find out more about the legal issues swirling around the use of Honeypots. Continue Reading
-
News
21 Jun 2004
Users at risk after web host attack
Users have been warned to brace themselves for attacks on sites which provide patch downloads and web hosting services. Continue Reading
By -
News
01 Jun 2004
From exposition to exploit: One security book's story
A new manual that discloses vulnerabilities may have had a hand in compromises at supercomputing centers this spring. Continue Reading
By- Anne Saita, News Writer
-
News
15 Apr 2004
Bacs launches online billing service
UK clearing house Bacs has embarked on a joint venture with a US software company to provide an online bill presentation and... Continue Reading
By -
News
06 Feb 2003
Users warned as number of software holes soars
IT departments were put on alert this week after it emerged that the number of security vulnerabilities discovered in commercial... Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
07 Feb 2002
Victory! Lords confirm CW stand - software flaw could have caused Chinook crash
An historic House of Lords report has this week vindicated a five-year campaign by Computer Weekly for justice after the crash of... Continue Reading
By -
Feature
14 Sep 2001
CBI warns on cybercrime
A new survey warns that UK e-commerce is being stifled by rising crime and consumer caution about buying goods on the Internet Continue Reading
By- Bill Goodwin, Computer Weekly
- Feature 26 Mar 2001
- Feature 25 Mar 2001
- News 13 Mar 2001
-
Feature
28 Feb 2001
Why PKI?
Public Key Infrastructure could revolutionise the way companies do business online - if only anyone would use it, says Danny... Continue Reading
-
News
24 Jan 2001
Government Gateway due to launch today
Ministers were today (25 January) hoping to officially launch the Government Gateway, the middleware project that will allow... Continue Reading
By- James Rogers
-
News
29 Mar 2000
MoD did not tell the whole truth on Chinook software
Letters from software experts to Computer Weekly show the Ministry of Defence omitted to mention it sanctioned the very testing... Continue Reading
-
Feature
08 Mar 2000
Leaked RAF memo scathing of safety software evaluation
Computer Weekly's Tony Collins uncovers evidence that the MoD has consistently undermined the authority of its software assessors... Continue Reading
By- Computer Weekly's Tony Collins
-
News
01 Mar 2000
Chinook software probe due
MPs are next week expected to investigate the air-worthiness of the engine control software on the type of Chinook helicopter involved in the crash Continue Reading
By -
News
09 Feb 2000
NAO report puts software at the heart of Chinook debate
Tony CollinsGovernment auditors will report tomorrow (Friday) that defence staff put into operational service a fleet of Chinook...
Continue ReadingBy