Trends

Older Windows Versions Left Out Of Code Cleanup

Microsoft Corp. is working to quickly retire old, security-weak code in its Windows operating system, but users running current or old versions won't be able to take advanta...

The Feds’ Top Hacker Speaks

One man is known for attacking the computer networks at various government agencies in the United States. His photo, along with a warning to not give him admittance to the ...

New Klez.G Email Worm Targets Outlook, Express

By eSecurity Planet staffVirus watchers are issuing warnings about a new variant of the Worm/Klez.E mass mailing worm that allows an email attachment to be executed by merel...

Vulnerabilities Found in Popular Web Scripting Language

By eSecurityPlanet.com StaffA vulnerability in the PHP scripting language, which is commonly used in Web site development, could enable attackers to execute code that crashe...

New Internet Explorer Security Flaw Found

A group of Russian researchers from SECURITY.NNOV has uncovered a new flaw in Microsoft Internet Explorer that would allow an attacker to execute arbitrary code on a victim...

Primer: Developing a site security policy

The first rule of network site security is easily stated: that which is not expressly permitted is prohibited. A security policy should deny access to all network resources ...

CyberSource offers tips for protecting sensitive data

CyberSource Corp., a provider of risk management and real-time payment systems for businesses that specializes in fraud detection, has released a list of 10 tips to help e-b...

Latest articles