Hacking

While enterprises may be on top of their security practices for the most part, data leakage as a result of end user misuse and abuse is something that might very well be flying under the radar. According to a newly released global study by Cisco, "The Challenge of Data Leakage for Business and Emplo...

Internet security firm IronPort Systems announced on Monday an enhanced layer of protection for its Web Security appliance S-Series with the addition of Exploit Filtering technology. The company made its announcement on the heels of the March launch of its URL Outbreak Detection and Botsite Defense....

ANALYSIS

Keeping the Web Barbarians at Bay

Aberdeen research shows that firewalls, VPNs, antivirus, antispam, intrusion prevention, and Web content filtering solutions are deeply penetrated in organizations of all sizes. Management of this portfolio of independent solutions can be time-consuming, costly and inefficient. An upcoming Aberdeen ...

IBM is increasing its arsenal against hackers with a new beefed-up blade server. The IBM BladeCenter PN41, announced this week, combines Deep Packet Inspection technology from CloudShield with IBM's other protection platforms to create a powerhouse against attacks. The system is designed specificall...

The enhanced degree of communication that Web 2.0 utilities enable is changing the corporate world, for good or for ill, as enterprises decide whether to reject or embrace concepts like wikis, blogs, social networks and video-sharing. The trend has touched the academic world in similar ways. Web 2.0

Dan Kaminsky, the security researcher who first sounded the alarm that the entire Internet was in grave danger due to a widespread vulnerability, has revealed in front of a packed audience at the Black Hat security conference the details behind the initial subterfuge -- and potential problems that c...

The British House of Lords has decided to extradite Gary McKinnon, a British citizen who hacked his way into several U.S. military, defense and NASA computers, to the United States to stand trial. McKinnon has been fighting extradition since the discovery in 2002 that he was the one who broke into t...

EXPERT ADVICE

Is Web 2.0 Security’s Achilles Heel?

We're facing a Web security gap. The Web has become the primary source of infections in enterprises, surpassing e-mail. Although most enterprises do some form of URL filtering on their Web traffic, it's proven to not be an adequate security solution alone. Only 15 percent of organizations are perfor...

Usually, it's a mayor who hands out the key to his or her city to residents deserving special recognition. In San Francisco's case, it was Mayor Gavin Newsom who took back the key to his city's computer network from the man who held it hostage for more than a week. The only positive recognition syst...

Web security firm Finjan issued a warning Thursday about a new wave of mass Web attacks that it said has affected more than 1,000 Web site domains, including government, retail, healthcare and advertising sites. Security vendors have been aware of the attack toolkit, dubbed "Asprox," for several yea...

The presidential campaign is turning a focus to cyberterrorism. Democrat Barack Obama has unveiled plans for a "national cyber advisor" position as well as updated standards for protecting computer-based infrastructures if he is elected. John McCain, the presumptive Republican nominee, has spoken of...

The other day I was visiting a partner company and asked if they had wireless Internet access I could use. The IT guy said they had not installed a wireless network due to security concerns, so instead he let me plug into the network to get access to a Web site I needed for our discussion. I don't b...

Officials have arrested a city of San Francisco IT network administrator for locking up a multimillion-dollar city computer system, according to several reports stemming from a press conference with San Francisco District Attorney Kamala Harris. The employee, Terry Childs, 43, is accused of improper...

High-profile data breaches continue to spotlight the growing risks consumers face of identity theft and credit card fraud. Four highly visible data breaches disclosed in the last 18 months are particularly worrisome because they show a systemic failure in the procedures that both the public and regu...

In Late April last year, about 1 million computers under botnet control started attacking the Estonian government's computers in a denial of service assault. The onslaught continued for three weeks. In the aftermath of this cyber warfare incident, NATO provided the Estonian government with some help...

What's your outlook for the business climate in 2025?
Loading ... Loading ...

Technewsworld Channels