As part of the recent Infosecurity Europe 2006 Conference in London, a Hackers' Panel included the likes of Gary McKinnon — also known as Solo, ...
Lumeta, a provider of network intelligence solutions, has promoted David Arbeitel to CTO and senior vice president of product strategy. He previously served as senior ...
Breach in Texas The University of Texas suffered its second major data breach in three years when more than 197,000 personal records were exposed at the ...
This month's topic: Companies should use unofficial patches to fix vulnerabilities
A number of recent critical flaws discovered in Mozilla Firefox has raised doubt on whether the open-source web browser still can be considered a much ...
As technically oriented security professionals we often don't pursue structure in our testing. We simply use the same vulnerability scans and penetration tests we've been ...
Just as the number of end-users enlisting instant messaging (IM) programs to communicate has risen, so too has the number of distinct families of IM-based ...
Smart cards make perpetrating fraud considerably more difficult than "traditional" magstripe cards. In regions where offline processing is the dominant method for processing transactions this ...
Send your comments, praise or criticisms to scfeedbackus@haymarketmedia.com. We reserve the right to edit letters.
Monitoring an illicit Internet Relay Chat (IRC) channel recently, Nicholas Albright couldnt believe what he was seeing. First, he observed a network operator sending commands ...
The message is clear for employees at the 19 Exchange Bank branches scattered across Sonoma County in California: Protect valuable customer information or risk damaging ...
Tarron Weir and Joseph Raquel might well be "poster boys" for the Secure Sockets Layer (SSL) virtual private network (VPN) movement. In fact, their experience ...
The break-neck speed and frequency with which corporate data breaches are happening these days has most enterprise executives racing to avoid becoming the next headline.
There's plenty of talk today about perimeter security strategies. Protecting the perimeter with multilayered security. Identifying the perimeter. The latest buzz on firewalls. Zero-day attacks. ...