Similar Articles |
|
PC World May 2001 Kim Zetter |
Hacker Nation Shadowy, computer-wise predators slip in undetected to steal data, deface Web sites, crash systems--or just look around. We talk to some current and former hackers to find out more about them and what they're after... |
InternetNews July 14, 2009 |
Microsoft Blocks Three New Security Holes Microsoft fixed a spate of zero-day holes in its latest Patch Tuesday drop. |
Bio-IT World September 11, 2003 Philip D. Quarles |
Safeguarding the Security of Clinical Data Given the frequency of Web site attacks, can data be safely stored on a server connected to the Internet? Yes, provided that the application is properly designed and the network and server properly secured. |
InternetNews March 16, 2004 Ryan Naraine |
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. |
InternetNews November 23, 2009 |
Zero-Day Exploit a Threat to IE6 & 7 Browsers? Another zero-day hole emerges in key Microsoft software. |
Wall Street & Technology January 5, 2005 David Tan |
Combating Blended Threats Security experts agree that blended threats will continue to grow in frequency, complexity and severity. |
InternetNews October 6, 2006 Ed Sutherland |
Microsoft Plans Nearly Dozen Patches Critical vulnerabilities in Microsoft's Windows operating system and the widely-used Office application suite are part of 11 patches slated to be released next week, according to a Microsoft. |
T.H.E. Journal December 2002 Vincent Weafer |
Blended Threats - A Deadly Duo of Hackers and Mobile Code Computer security threats evolve and require defenses that also evolve. For any school or classroom that uses computer technology, Internet-borne security threats are evolving and becoming increasingly dangerous. |
InternetNews April 12, 2004 Sean Michael Kerner |
Beware of Browser-based Attacks Hackers entering through holes in browsers 'may pose the next significant security threat to IT operations,' a new report warns. |
PC World November 2004 Harry McCracken |
Is This Any Way to Fix Security Holes? How today's software patching process actually helps hackers do their job. |
Insurance & Technology May 14, 2005 Michael Cohn |
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. |
InternetNews August 10, 2006 Andy Patrizio |
To Patch Or Not To Patch? Microsoft issues a fix to a severe hole. The government insists we use it, but is there a risk? |
InternetNews November 8, 2004 Jim Wagner |
Report: A Misplaced Sense of Security? As many as 20 percent of big business networks admit to unauthorized breaches, yet many feel more secure. |
Salon.com August 29, 2001 Damien Cave |
How do you fix a leaky Net? Brian West says he was doing a public service when he pointed out a security hole in an Oklahoma newspaper's Web site. So why did the editor in chief call the cops? |
InternetNews November 24, 2009 |
Microsoft Confirms Bug in Older IE Versions The question is how long will it take hackers to launch attacks in the wild, and will Microsoft have a patch by then? |
InternetNews November 10, 2009 |
Feds Facing Daily Cyber Threats, Tight Budgets New study highlights shortcomings in federal cybersecurity amid White House policy overhaul. |
InternetNews August 13, 2010 |
Microsoft's Patch Tuesday Fixes Spoofing Flaw In one of its biggest patch drops in history, Microsoft has issued a fix for a hole in a bit of Windows code that could enable hackers to carry out a spoofing attack. |
InternetNews July 9, 2009 Stuart J. Johnston |
'Patch Tuesday' Will Fix ActiveX Zero-Day Microsoft to patch hole that has already led to thousands of attacks. |
PC World August 22, 2006 Stuart J. Johnston |
Bugs & Fixes: Hackers' Latest Office Target Is PowerPoint How hackers find holes in Windows applications... Critical Adobe flash player vulnerability... Recall of overheating JumpDrives... |
PC World April 2, 2001 Kim Zetter & Andrew Brandt |
How Hackers Hack The tricks hackers use, and what you can do to foil them... |
CIO October 1, 2003 Art Jahnke |
Should Software Vulnerabilities Be Posted Online? Readers weigh in with their opinions on this thorny issue. |
InternetNews February 17, 2006 Ed Sutherland |
Microsoft Media Player Exploits Released Just days after Microsoft fixed a hole discovered in its Windows Media Player, security firms report exploits are now targeting the vulnerability. |
Bank Technology News April 2001 Maria Bruno |
Hackers Steal 1 Million Card Numbers Teams of Russian and Ukrainian hackers stole more than 1 million credit card numbers from 40 American e-businesses in recent months, according to the Federal Bureau of Investigation... |
InternetNews May 1, 2006 David Miller |
Zero-Day Attacks an Ongoing Menace Security report from the SANS Institute details biggest Internet vulnerabilities. |
InternetNews October 9, 2007 Andy Patrizio |
Microsoft Patches IE, Office Holes A favorite target of virus writers, Internet Explorer, is the recipient of four new vulnerability fixes today from Microsoft in the latest of the company's regular monthly product updates. |
BusinessWeek August 22, 2005 Grow & Hamm |
From Black Market To Free Market Frustrated computer-security firms are offering to buy tips from the very hackers who bedevil them. |
InternetNews December 1, 2005 Sean Michael Kerner |
Backup Software Under Attack A SANS report on top security vulnerabilities finds that backup and recovery software has become a favorite target of hackers. |
PC World December 20, 2001 Matt Berger |
Windows Patch Plugs 'Critical' Holes Microsoft issues a fix for a major flaw -- kept secret for five weeks -- that leaves Windows XP, Me, and some 98 systems vulnerable when online... |
CFO January 1, 2006 John McPartlin |
Hackers Find Backers Large organizations should prepare themselves for more-clever and more-targeted attacks against their security infrastructures this year. Computer crime is now a game for professionals. Are companies prepared to respond? |
InternetNews April 20, 2010 |
Hackers Breached Google's Password Hub: Report New report cites source close to investigation claiming that hackers in China were able to compromise the password service that acts as gateway to Google's Web products and services. |
InternetNews July 2, 2010 |
Windows XP Zero-Day Leads to 10,000+ Attacks Microsoft says that the vulnerability, revealed last month, has caught the attention of attackers. |
InternetNews September 14, 2010 |
Patch Tuesday Fixes Another Stuxnet Vulnerability Thirteen security holes get patches in the latest roundup of fixes from Microsoft. |
InternetNews August 11, 2009 |
Microsoft's Patch Tuesday Fixes More ATL Holes Microsoft issued patches for 19 security holes in its products as part of this month's Patch Tuesday roundup - including updates designed to lock down several persistent, high-profile vulnerabilities. |
PC World March 2004 Stuart J. Johnston |
New Flaws With Internet Explorer, Excel It's a grab bag of Microsoft updates this month: You need to know about a new hole in Internet Explorer. Plus, the company announced that it was extending all paid support for Windows 98 and Me. |
InternetNews June 9, 2009 Stuart J. Johnston |
Microsoft's Biggest Bug Stomp Ever Security firms say Tuesday's patches fix more bugs than ever before, meaning plenty of work to do. |
InternetNews April 2, 2007 Michael Hickins |
Game On: Microsoft to Issue Emergency Patch Microsoft is issuing the patch in advance of its usual Patch Tuesday schedule to counter role-play game hackers. |
InternetNews February 4, 2010 |
Firewall Mishap Puts Iowa Workers' Data at Risk More than 80,000 people affiliated with the Hawkeye State's casino and racing industry were victimized by a cyber attack that most likely originated in China. |
PC World November 2001 Kim Zetter |
PC Security: Holey Software! New security bugs appear weekly, letting hackers attack your data. Here's why apps are so full of holes and how you can protect yourself... |
InternetNews October 13, 2009 |
Microsoft Plays Catch-Up With Biggest Patch Drop Patch Tuesday fixes 34 bugs with 13 patches - including patches for the as-yet-unreleased Windows 7. Are you affected? |
Home Theater April 1, 2010 Mark Fleischmann |
Smart Meters Maybe Not So Smart Security holes may let hackers steal your juice. |
CRM May 2015 Leonard Klie |
Data Security Should Be in Everyone's Job Description Protecting valuable customer information should begin in the contact center and end in the executive suite. |
InternetNews March 15, 2010 |
Microsoft Developing Patch for IE Zero-Day Flaw Microsoft scrambles to deliver a workaround to protect against a zero-day exploit in its Internet Explorer browser, says it is developing a more permanent patch. |
PC World June 2004 Stuart J. Johnston |
Worms Come Faster: Are You at Risk? Play it safe and install the latest Outlook and MSN Messenger updates to protect against the new worms. |
InternetNews March 30, 2004 Ryan Naraine |
Malicious Cisco Code Circulating The release of a hacking toolkit to exploit security holes in Cisco products has sent the networking giant scrambling. |
Registered Rep. May 24, 2011 Lauren Barack |
Cyber-Hackers: Faster, Better Equipped Than You Security should be the responsibility of all employees - not just the chief technology officer, or the principal of an advisory firm. |
InternetNews April 16, 2009 Alex Goldman |
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. |
InternetNews September 7, 2006 Ed Sutherland |
Microsoft Investigates Word 2000 Trojan Microsoft said it has launched an investigation into reports of a new Trojan horse targeting Word 2000. |
PC World June 27, 2002 Joris Evers |
Windows Media Player Flaw Puts PCs at Risk Security hole in media player's antipiracy feature could allow hackers to access your computer. |
InternetNews March 16, 2004 Sharon Gaudin |
Report: Threats Coming from all Sides A Symantec study shows that the number of software security flaws has leveled off over the past year. That sounds like good news until you find out that it's leveled off at seven new vulnerabilities a day, or 2,636 a year. |
InternetNews January 19, 2010 |
Microsoft to Ship 'Out-of-Band' Patch New zero-day hole aided hackers in Google attacks and required immediate action. |