Jim Wagner - Article Archives - Page 1

Guidance Software Investigating Stolen Data

December 22, 2005
A computer forensics software developer finds itself on the receiving end of a malicious hacking attack.
READ MORE

Santa IM Worm Making a List

December 21, 2005
The medium-risk worm downloads a rootkit and starts a keylogger to grab user information.
READ MORE

Dasher Worm No Friendly Reminder

December 19, 2005
Corporations are at the most risk from a recently discovered worm.
READ MORE

Microsoft Crafts Critical Patches

December 14, 2005
Redmond rounds out 2005 with IE patches.
READ MORE

Angling to Guard Inside Information

December 13, 2005
Security company Oakley takes aim at network leaks that happen behind the firewall, not malicious hackers from the outside.
READ MORE

Sober Worm Has Nazi Connection

December 9, 2005
The worm's deadly campaign is expected to resume Jan. 5, 2006, the anniversary of the Nazi party.
READ MORE

Roping Off Quarantines in the Gateway

November 21, 2005
McAfee comes out with a quarantine manager to keep track of the different quarantines in a large environment.
READ MORE

Senate Shot at Anti-Spyware

November 21, 2005
Legislation criminalizes unauthorized downloads and mandates disclosures of privacy threats.
READ MORE

Microsoft's Three-Pronged Phish Attack

November 18, 2005
Redmond partners with three phishing data providers to expand the filtering technology in its products.
READ MORE

Microsoft's Three-Pronged Phish Attack

November 18, 2005
Redmond partners with three phishing data providers to expand the filtering technology in its products.
READ MORE

Sony Recalls Rootkit-Plagued CDs

November 17, 2005
The music giant blames the software developer behind its copyright protection.
READ MORE

Postini and the On-Again, Off-Again Spam List

November 15, 2005
The message security company briefly found itself on the Spamhaus Project's block list after a recent e-mail campaign, resurrecting the debate over DNSBLs.
READ MORE

Microsoft to Block Sony DRM Rootkit

November 14, 2005
Redmond joins others hot on rootkit trail.
READ MORE

Report: ID Theft Haunting Bank Customers

November 11, 2005
Banks need to address the growing concern among their customers over ID theft or risk losing them.
READ MORE

Researchers: Skype, VoIP Are Hot And Risky

November 11, 2005
IT managers should take precautions when allowing VoIP use, specifically Skype, in the workplace researchers warn.
READ MORE

Sun Flaws Make Contest Fodder

October 31, 2005
The company wants developers to find a way to crack the new security component to be found in J2SE 6.0.
READ MORE

McAfee Strengthens Foundstone Arm

October 31, 2005
The company puts remote management and regulatory compliance in the hands of its IT management and vulnerability assessment arm.
READ MORE

Group Delivers The Meaning of 'Spyware'

October 28, 2005
With the definition set, the ASC sets out to find the apps that can be considered spyware.
READ MORE

Red Hat Tests Security Skills

October 14, 2005
The Linux distributor launches a performance-based security cert for the OS.
READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|