Trends

Microsoft Fixes ‘Critical’ Flaw in MDAC

Microsoft has tagged a "critical" rating on a security flaw found in Data Access Components (MDAC) used to provide database connectivity on Windows platforms, warning that...

Apache Flaws Being Exploited

The Apache HTTP Server Project has warned that several security holes in the Apache source are being actively exploited on the Internet, urging IT managers to urgently upg...

Massive DDoS Attack Hit DNS Root Servers

A massive distributed denial-of-service (DDoS) attack of unknown origin briefly interrupted Web traffic on nine of the 13 DNS "root" servers that control the Internet but experts on Wednesday dismis...

Web Vandalism on the Rise

Web vandalism is on the rise around the world, underscoring the shoddy state of affairs in IT security, according to the owner of a Web site that tracks such information. ...

Disaster Recovery: A Preparation Checklist

The terrorist attacks of Sept. 11 have taught many CIOs and CSOs one thing -- prepare for the unexpected. Dave Johnson, director of technology at Grant Thornton, a global a...

Honeypots Turn The Tables On Hackers

Honeypots are positioned to become a key tool to defend the corporate enterprise from hacker attacks, but some security watchers worry they could bring a new set of securi...

Top 10 Enterprise Security Risks

Network administrators are besieged today with a growing list of security risks, and analysts warn that too often they get caught up in battling one or two vulnerabilities a...

Pfizer Security Chief: ‘It’s All About Protecting The Business’

Steve Nyman, director of information security at Pfizer Inc., is the man in charge of protecting the research, chemical formulations and financial information at the $35 bil...

Vulnerabilities Found in Popular Web Scripting Language

By eSecurityPlanet.com StaffA vulnerability in the PHP scripting language, which is commonly used in Web site development, could enable attackers to execute code that crashe...

Primer: Developing a site security policy

The first rule of network site security is easily stated: that which is not expressly permitted is prohibited. A security policy should deny access to all network resources ...

Latest articles