White House e-mail crashes
The tech-savvy Obama White House is suffering the inconvenience and embarrassment of an e-mail crash that has lasted several hours Monday afternoon, according to published reports.
Tim Greene | 28 Jan | Read more
The tech-savvy Obama White House is suffering the inconvenience and embarrassment of an e-mail crash that has lasted several hours Monday afternoon, according to published reports.
Tim Greene | 28 Jan | Read more
A British hacker who sought to find evidence of UFOs on U.S. military computers has another chance at avoiding extradition after a court ruling Friday.
Jeremy Kirk | 27 Jan | Read more
VeriSign said it plans to buy Certicom, just three days after Research In Motion's hostile bid for the security company unraveled.
Nancy Gohring | 27 Jan | Read more
Hackers have discovered a new way to steal your money: texting it out of your phone.
Robert McMillan | 23 Jan | Read more
Shutting down computer attacks could be carried out inexpensively by peer-to-peer software that shares information about anomalous behavior, say researchers at the University of California at Davis.
Tim Greene | 14 Jan | Read more
Step 1: Identify a computer virus specimen. Step 2: Create a "signature" to detect and eradicate the virus, and push the signature file out to a computer. Step 3: Repeat steps 1 and 2 again and again for new viruses and their variants.
Ellen Messmer | 15 Dec | Read more
More than 98% of Windows computers harbor at least one unpatched application, and nearly half contain 11 or more programs at risk from attack, a Danish security company said Wednesday.
Gregg Keizer | 04 Dec | Read more
WabiSabiLabi may shut down its online marketplace for security vulnerabilities, focusing instead on the line of OneShield unified threat management (UTM) appliances it developed with Italian defense company EuroTech.
Sumner Lemon | 30 Oct | Read more
IBM, LexisNexis and the Secret Service are among a group of corporations, government agencies and academic institutions that has formed to study and help solve identity management challenges around cybercrime, terrorism and narcotics trafficking.
John Fontana | 09 Oct | Read more
The vast majority of companies have little or no security in place for their virtual systems. That is a scary statistic revealed in a survey of attendees at the recent VMWorld 2008 conference in Las Vegas.
Tom Jowitt | 02 Oct | Read more
Malware has managed to get off the planet and onto the International Space Station, NASA confirmed yesterday. And it's not the first time that a worm or virus has stowed away on a trip into orbit.
Gregg Keizer | 28 Aug | Read more
Unless you're a dyed in the wool cryptographic geek you probably didn't know that there was a Crypto conference, or even a chain of worldwide crypto conferences that take place each year. Fortunately, for the most of us that aren't crypto geeks there are a handful of very highly skilled people who are; they can take the highly theoretical and complex mathematical proofs and arguments that make up most of modern cryptographic and cryptanalytic research and put it into plain language.
Carl Jongsma | 22 Aug | Read more
Apple has taken the place of Microsoft for disclosing more vulnerabilities than any other vendor, according to an IBM security report.
Darren Pauli | 05 Aug | Read more
There were 6 a.m. calls from Finnish certificate authorities and also some pretty harsh words from his peers in the security community, even an accidentally leaked Black Hat presentation, but after managing the response to one of the most highly publicized Internet flaws in recent memory, Dan Kaminsky said Wednesday that he'd do it all over again.
Robert McMillan | 07 Aug | Read more
A recent study of Web browser installations showed that far too few are up to date with the latest security patches. And browsers aren't alone; as my dear old mum can attest, it can be hard to keep up with OS and application patches when all you want to do is use your computer for work. It should come as no surprise that many PCs are vulnerable to security exploits that could otherwise be prevented.
Neil McAllister | 31 Jul | Read more
Open source software is a significant security risk for corporations that use it because in many cases, the open source community fails to adhere to minimal security best practices, according a study released Monday.
Ellen Messmer | 22 Jul | Read more
The researcher whose speculation led to an early disclosure of information about a critical flaw in the Domain Name System (DNS), the Internet's traffic cop, wasn't the first to come close to the truth, said the security expert who found the bug and organized a massive patching effort.
Gregg Keizer | 24 Jul | Read more
Japan's Self Defense Force lost sensitive data pertaining to a joint US-Japan military exercise last year, the Ministry of Defense said Tuesday.
Martyn Williams | 02 Jul | Read more
Visitors to the Association of Tennis Professionals Web site have potentially been infected with spyware after apparent lax security allowed a malicious script to be injected across its pages.
Darren Pauli | 02 Jul | Read more
Microsoft and Hewlett-Packard on Tuesday unveiled free tools to help Web developers and site administrators defend against the rapidly growing number of SQL injection attacks that aim to hijack legitimate sites.
Gregg Keizer | 25 Jun | Read more