Networks

U.S. DOJ: The Cloud Provides No Legal Cover for Criminals

The Cloud is a model for computing that provides new opportunities for consumers, businesses -- and yes, even criminals. As a result, one question that has emerged is: What is the reach of U.S. law ...

RSA Chief: Conventional Security Defenses Are Inadequate

How do you get ahead of advanced security threats? According to a new report, the key is "intelligence-driven information security."The new report from the RSA-sponsored Sec...

Symantec Admits Its Own Network Was Hacked

After initially blaming a security breach on a third party, Symantec today admitted that hackers had accessed its own network in a 2006 attack."The hackers obtained 2006-era source code for Norton A...

Protecting Against SQL Injection Attacks with Oracle Database Firewall

Exploits that take advantage of SQL Injection (SQLi) vulnerabilities in software are among the most dangerous and prevalent attacks on the Internet today.In a SQLi attack, hackers typically take adv...

Finding Attack Patterns at the Digital Crime Scene

In the physical world of criminal investigation, police investigators aim to build a profile of the criminal in an effort to help catch the guilty party. The same basic idea is now being applied in ...

Apache Server Hit by Reverse Proxy

The open source Apache HTTP Web Server is at risk from a reverse proxy flaw that is currently unpatched. The flaw was disclosed Qualys security researcher Purtha Parikh late...

Centrify Updates Active Directory Integration Solution

Seeking to ease the pain of IT professionals tasked with centralizing identities to cross-platform systems and enabling single sign-on, Centrify Tuesday launched Centrify Ex...

Review: Sophos Endpoint Security

Sophos is one of the leading corporate endpoint security vendors, and its Endpoint security product line is aimed at SMEs with as few as 10 users up to 500 or more -- the on...

Review: 3 Free Bootable Rescue Discs

We recently reviewed some free bootable antivirus discs that you can use to scan and remove malware from outside of Windows. Now we’ll review some general bootable rescue di...

How to Prevent Employees from Stealing Your Intellectual Property

Preventative security -- or the scaring off of potential data thieves off before they commit crimes -- is inexpensive and easy to implement: Three simple measures can save companies around the world...

Latest articles