To the average IT security practitioner, the idea of disabling antivirus on new machines might seem blasphemous. After all, <a href="http://www.csoonline.com/article/342820">weren't we all told in IT Security 101 that everyone needs AV</a> to keep the malware and data thieves at bay?
Bill Brenner |
25 Jun |
Read more
A team of journalists investigating the global electronic waste business has unearthed a security problem too. In a Ghana market, they bought a computer hard drive containing sensitive documents belonging to U.S. government contractor Northrop Grumman.
Robert McMillan |
25 Jun |
Read more
A new product from Phoenix Technologies, <a href="http://www.phoenixfreeze.com/">called Freeze</a>, lets you use BlackBerry or iPhone Bluetooth to tell a PC that you're leaving the area and want it to lock up. When you return, Phoenix Freeze can also automatically unlock the machine so it's ready for you. However, it only works on Windows PCs, doesn't support 64-bit platforms, disables all other Bluetooth peripherals and seems to be a bit buggy for an official release. Phoenix Freeze for BlackBerry and iPhone
Al Sacco |
25 Jun |
Read more
McAfee is expanding its staff in China amid a boom in the country's security market fueled by the launch of next-generation mobile networks.
Owen Fletcher |
23 Jun |
Read more
Google engineers have put in place several measures to remove pornography from search results in China, after the government warned the company its filter was too weak.
Dan Nystedt |
23 Jun |
Read more
As mobile users are more frequently pestered by SMS spam, one security vendor is applying its experience in stopping e-mail spam for mobile networks.
Jeremy Kirk |
24 Jun |
Read more
Former Apple Macintosh evangelist Guy Kawasaki posts Twitter messages about a lot of different things, but the message he put up on Tuesday afternoon was really out of character.
Robert McMillan |
24 Jun |
Read more
A U.S. company that says its code was copied by a Chinese Internet filtering program has ordered more PC makers not to distribute the Chinese software.
Owen Fletcher |
19 Jun |
Read more
China will submit its wireless LAN security protocol to the International Organization for Standardization (ISO) for consideration as a global standard, years after its rejection by the standards body incensed Chinese backers.
Owen Fletcher |
16 Jun |
Read more
The Kantara Initiative, formed to promote interoperability among identity verification applications and services, launched on Wednesday with big-name backers like Oracle, Intel, eBay's PayPal, AOL, CA, Novell, Fidelity Investments, Liberty Alliance, Boeing, Internet Society and British Telecom.
Juan Carlos Perez |
17 Jun |
Read more
When I first started writing about information security five years ago, all a writer had to do was mention Microsoft in the same headline space as "security vulnerability" to strike page-view gold. In 2004 Microsoft was a couple years into its Trustworthy Computing Initiative but it remained the software company IT security practitioners hated with glee.
Bill Brenner |
10 Jun |
Read more
In the middle of the 1800s, a few prospectors found gold in California. When word got out, the lure of instant wealth spurred hundreds of thousands to rush to the West. Farmers, city slickers, people with no particular training or skills, all flocked to California to pan for gold.
Gary Clayton and Kevin Coleman |
06 Jun |
Read more
The U.S. government has significant work to do before it can better cooperate with the private sector and other governments to better protect cybersecurity, a government cybersecurity expert said.
Grant Gross |
13 Jun |
Read more
CIOs think about <a href="http://www.cio.com/article/32306/Privacy_Is_Your_Business">privacy</a> the way some people think about exercise: with a sigh and a sense of impending pain. Outside of regulated industries like health care--where patient privacy is paramount--privacy affects CIOs as a corollary of security when, say, a laptop holding millions of people's records is lost or hackers siphon off customer data.
Michael Fitzgerald |
12 Jun |
Read more
The U.S. government needs to spend more money on cybersecurity research and development and on education programs in order to fight a rising tide of attacks against government and private groups, cybersecurity experts told U.S. lawmakers.
Grant Gross |
11 Jun |
Read more
When it comes to security, the British government's Consulate-General in New York, part of the United Kingdom's diplomatic mission for business and visa-related activities, is taking no chances on spies or other intruders sneaking onto its network.
Ellen Messmer |
11 Jun |
Read more
A Web application firewall (WAF) is designed to protect Web applications against common attacks such as <a href="http://blogs.csoonline.com/xss_the_spark_to_the_ajax_dynamite">cross-site scripting</a> and <a href="http://blogs.csoonline.com/sans_warns_of_mass_sql_injection_attacks">SQL injection</a>. Whereas network firewalls defend the perimeter of the network, WAFs sit between the Web client and Web server, analyzing application-layer traffic for violations in the programmed security policy, says Michael Cobb, founder of Cobweb Applications, a security consultancy.
Mary Brandel |
11 Jun |
Read more
In one of the more famous episodes of the original "Star Trek" series - "The Trouble With Tribbles" - Capt. Kirk confines Chief Engineer Montgomery Scott to his personal quarters for getting into a bar fight.
Bill Brenner |
10 Jun |
Read more
Cash machines around the world are hosting malware that can harvest a person's card details for use in fraud, a situation that could worsen as the malware becomes more sophisticated, according to a security researcher.
Jeremy Kirk |
06 Jun |
Read more
Websense CTO Dan Hubbard outlines four ways companies can protect their information from threats and compromise on the social Web.
Dan Hubbard |
06 Jun |
Read more