Microsoft Corp. is working to quickly retire old, security-weak code in its Windows operating system, but users running current or old versions won't be able to take advanta...
One man is known for attacking the computer networks at various government agencies in the United States.
His photo, along with a warning to not give him admittance to the ...
By eSecurity Planet staffVirus watchers are issuing warnings about a new variant of the Worm/Klez.E mass mailing worm that allows an email attachment to be executed by merel...
By eSecurityPlanet.com StaffA vulnerability in the PHP scripting language, which is commonly used in Web site development, could enable attackers to execute code that crashe...
A group of Russian researchers from SECURITY.NNOV has uncovered a new flaw in Microsoft Internet Explorer that would allow an
attacker to execute arbitrary code on a victim...
The first rule of network site security is easily stated: that which is not expressly permitted is prohibited. A security policy should deny access to all network resources ...
CyberSource Corp., a provider of risk management and real-time payment systems for businesses that specializes in fraud detection, has released a list of 10 tips to help e-b...