Incident ResponseDanger within: The inside threatDan RaywoodOctober 1, 2013Every business faces the possibility of external attacks, but another potential threat is on the premises, reports Dan Raywood.
Threat ManagementFacebook detail harvest not security issueDan RaywoodJuly 30, 2010A security consultant said that he collected and published the names of one fifth of Facebook's global user base as part of his work on a security tool.
Security ArchitectureMcAfee to acquire mobile security companyDan RaywoodJuly 30, 2010McAfee has entered into a definitive agreement to acquire tenCube to add to the service acquired in the Trust Digital deal.
ContentPresident Obama greets new cybersecurity chiefDan RaywoodDecember 23, 2009The appointment of President Obama's new cybersecurity coordinator, Howard Schmidt, has drawn mostly favorable assessments.
Security ArchitectureGoogle’s traffic jam was not a DDoS attackDan RaywoodMay 15, 2009Google has apologized after it suffered a huge traffic jam that left millions of users unable to access the site Thursday.
Security ArchitectureIs Conficker overhyped?Dan RaywoodMarch 27, 2009Reports of the Conficker worm are being vastly exaggerated and it will not have as big an impact as is being predicted, claims a security researcher.
Security ArchitectureNew version of DNS changing malware detectedDan RaywoodDecember 12, 2008A new twist in DNS-changing malware poisons other hosts on a local subnet, and installs a rogue DHCP server.
Application securityMajor spam host closed downDan RaywoodNovember 13, 2008A web-hosting firm that apparently sent out more than 75 percent of worldwide spam has been knocked offline.
Compliance ManagementIT security policy enforcement strugglesDan RaywoodOctober 30, 2008Companies are struggling to come to grips with the basics of vulnerability management.
Security ArchitectureChina’s internet users lash out at Microsoft’s anti-piracy systemDan RaywoodOctober 24, 2008Chinese internet users have criticized what they deem to be Microsoft's violation of their right to privacy.