Network Security - Article Archives - Page 260

Disaster Recovery: A Preparation Checklist

September 12, 2002 |
For too many IT managers, the security fervor that erupted last fall has dissipated. But disaster recovery experts say a company's future literally can hinge on how well-prepared it is for a serious outage. Here are some recommendations for companies preparing for the worst.
READ MORE

ActiveX Flaw Bugs Apple's QuickTime

September 11, 2002 |
The vulnerability exists in the way the ActiveX component handles the 'pluginspage' field when parsed from a malicious remote or local HTML page.
READ MORE

Online Privacy at Odds with Security

September 11, 2002 |
FEATURE: While privacy groups make a First Amendment stand, IT companies are the ones walking a fine line between personal freedom and keeping a competitive edge.
  • Special Report: 9/11 - One Year Later
  • READ MORE

    I've Been Framed

    September 09, 2002 |
    New vulnerability discovered in IE could allow attackers to compromise your computer through a Web site's frames.
    READ MORE

    IM Security Risks Spark Workplace Monitoring Debate

    September 06, 2002 |
    With more and more U.S. workers using instant messaging in the office, security experts are debating whether IT managers should be monitoring the instant communications.
    READ MORE

    'Pretty Good' Isn't Good Enough

    September 06, 2002 |
    A new vulnerability in the omnipresent PGP encryption software could allow hackers to take over your computer.
    READ MORE

    Malicious Spam On The Rise

    September 05, 2002 |
    Email spam is rapidly becoming the 'Tool of Choice' for Internet fraud and identity theft.
    READ MORE

    Microsoft Airs Critical Identity Spoofing Flaws

    September 05, 2002 |
    UPDATE: Once again, Microsoft is forced to whip up a slew of patches; this time, flaws that enable perpetrators to spoof Web sites are deemed 'critical.'
    READ MORE

    Bush Administration to Call for Privacy Czar

    September 03, 2002 |
    The Bush administration is expected to call for the creation of a federal chief privacy officer to help minimize criticism of increased electronic surveillance capabilities attached to its National Strategy for Securing Cyberspace.
    READ MORE

    Getting Past WLAN 'Apathy'

    August 30, 2002 |
    FEATURE: Despite the dangers, some legitimate and some media-inspired, corporate wireless networks around the country are still at risk to hackers and wardriving enthusiasts.
    READ MORE

    The Need For Security -- And Ethics -- Education

    August 29, 2002 |
    There are plenty of lessons to be learned in the saga of the Princeton admissions director who was caught breaking in to confidential files on a Yale Web site.
    READ MORE

    New Active-X Vulnerability Discovered

    August 29, 2002 |
    A newly discovered vulnerability in many versions of Microsoft OS could leave you vulnerable to DoS.
    READ MORE

    Network Security Risks Of Mergers Too Often Ignored

    August 26, 2002 |
    Corporate acquisitions and mergers, while good for the bottom line, often end up being a security nightmare, according to industry analysts.
    READ MORE

    New Flaws Discovered on IE, Office

    August 23, 2002 |
    Six new flaws were discovered in Microsoft Internet Explorer that could leave your computer vulnerable.
    READ MORE

    Bush Security Plan Would Target E-Mail

    August 23, 2002 |
    Under the terms of a proposed draft, government would centralize e-mail and threat data, including calling on private sector to share IT security information.
    READ MORE

    Secret Service Veteran: Corporations Lax About 'Inside' Security

    August 22, 2002 |
    A former U.S. Secret Service agent, experienced in risk assessment and high-tech crime, says companies are doing a poor job of securing themselves from the inside out.
    READ MORE

    Security Warning For Microsoft Office Web Components

    August 22, 2002 |
    Microsoft warns there are three security vulnerabilities in Office Web Components -- software used to give users limited Office functionality in a Web browser -- the most serious of which could enable an attacker to execute commands on a user's system.
    READ MORE

    In The Anti-Virus Trenches: Interview With Joe Wells

    August 20, 2002 |
    Joe Wells, founder of the WildList and a key player in the antivirus community, speaks out on the growing complexity of viruses, what companies are still doing wrong and what threats to expect in the future.
    READ MORE

    Network Associates Sells PGP Line

    August 19, 2002 |
    New startup PGP Corp. buys the encryption products as part of its bid to become a player in providing security for data and network storage products.
    READ MORE

    Flaw Found in Popular Unix, Linux GUI

    August 15, 2002 |
    The CERT Coordination Center (CERT/CC) this week issued an advisory regarding a buffer overflow vulnerability in the Common Desktop Environment (CDE), a graphical user interface employed in numerous Unix and Linux systems. The vulnerability could enable attackers to execute code or cause a denial of service.
    READ MORE