Spouse cyberspying dangerous, possibly illegal
Increasing use of stealthy surveillance software for computers and phones is raising legal concerns and alarm among those who help victims of domestic violence.
Increasing use of stealthy surveillance software for computers and phones is raising legal concerns and alarm among those who help victims of domestic violence.
A honeypot is simply a "closely monitored computing resource that we want to be probed, attacked or compromised," Niels Provos and Thorsten Holz tell us in their new book, Virtual Honeypots.
Security consultancy iSec Partners this week detailed half a dozen ways to compromise VoIP-based phone systems based on the H.323 and Inter Asterisk eXchange protocols.
Can rootkit malware that hides by mimicking a software-based virtual machine ever be detected? That was the topic of debate as security researchers presented their latest findings to packed audiences at the Black Hat Conference here.
Do your company's employees seem like easy dupes for e-mail phishing attacks and other scams? A vulnerability-assessment tool from Core Security Technologies lets you set up automated tests to find out.
HP says a broad range of its computer hardware running Red Hat Enterprise Linux 5 has been examined and certified as compliant under the international Common Criteria product-evaluation program backed by the U.S. government and sometimes required for government technology acquisitions.
Spurred to find ways to protect consumers as online shopping grows, the 30 countries belonging to the international economic and social-development group Organization for Economic Co-Operation and Development (<a href="http://www.networkworld.com/news/2005/053005-spam-oecd.html">OECD</a>) announced Monday an accord on dispute resolution.
With its acquisition of security vendor Cybertrust officially completed Monday, Verizon began discussing how it intends to merge Cybertrust with Verizon's Business Managed Security Services group.
Compellent Technologies on Tuesday announced plans to go public, following in the fresh footsteps of a host of other storage network companies.
Can mobile phones be hacked? As that question is debated in the wake of a family in Washington, US claiming the phones it uses have been <a href="http://www.thenewstribune.com/front/topphoto/story/91460.html" target="_blank">taken over by hackers</a>, Nokia is weighing in. The company says it is possible -- but very difficult -- to hack into and manipulate phones based on the S60 Symbian platform it developed.
IBM Thursday announced improved security and audit features for its Tivoli Compliance Insight Manager (TCIM) to include a way to generate customized reports on whether internal security policies are being followed. Such reports are intended to assist customers with providing evidence of regulatory compliance.
McAfee on Monday announced it will deliver an updated version of ePolicy Orchestrator, its umbrella management console for McAfee security products, by the third quarter of this year.
While 78 percent of large companies say their databases are "critical" or "important" to their business, 40 percent of them don't monitor databases for security purposes.
Adobe on Monday said it's broadening its LiveCycle Enterprise Suite development software to add a way to create wizard-like "Form Guides" and flash-based graphics so users can interact easily with PDF-based content online.
McAfee Monday pledged a renewed focus on the small-and-midsize business market, where the security firm said it's beefing up its product line and sales support.