Security researchers look beyond Vista
Improved security in Microsoft's newest software products may leave some security researchers looking elsewhere for work.
Improved security in Microsoft's newest software products may leave some security researchers looking elsewhere for work.
NSW reseller Base IT has signed signature-free and scan-free virus protection from Sana Security to plug a hole in its security portfolio.
Storm may not be the most creative or malicious piece of malware ever written, but it's on track to become the most productive; threat researchers' recent estimates put the number of PCs it has infected at more than 1 million.
SAP enterprise systems were never developed for security, researchers say. Since such systems manage the core information for many major companies, this is a major flaw. As more vulnerabilites are discovered, the situation is ripe for large-scale industrial espionage.
Sophos has enhanced its Endpoint Security and Control product that lets companies block employee use of remote connection tools.
When the names and personal information of 1,200 eBay users, along with credit card numbers, suddenly appeared yesterday on eBay's Trust & Safety Discussion Board where public comment is shared, eBay responded by immediately shutting down the discussion board.
HP this week claimed to be the first to implement a technology designed to improve traffic monitoring in wireless networks.
eBay's security experts have determined that it's highly likely that whoever posted confidential information about its members in a company discussion forum this week stole the data via an e-mail phishing scam, an eBay spokeswoman said this week.
Developers and other supporters of the Kerberos authentication platform gathered at MIT's Stata Center on Thursday to unveil a new industry effort aimed at furthering the technology.
Engate Technology Thursday announced a version of its antispam software that the company says includes the industry's first preemptive protection against phishing attacks.
The percentage of threats arriving in e-mail that rely on links to malicious sites -- rather than arriving as a file attachment -- has ballooned 10-fold since the first quarter of the year, a UK security company said today.
The security threat posed by wireless networks has been a hot-button issue for years now. Are they still a prime target for hackers?
Want wireless security? Fine, click the WPA2 button during your router setup, enter a key, change the default log-on, and you're good.
If you've got a wireless network at home or at your business and don't take special care to protect it, well, you're playing Russian roulette -- and the chamber is loaded with multiple bullets.
iPhone hackers have some new tools now, thanks to HD Moore, one of the developers of the Metasploit hacking software.
Fraud investigators are struggling to cope with vast quantities of data sent to them by financial institutions, meaning some crimes may go uninvestigated or even unnoticed, experts said at the 2007 Fraud World Conference.
Questions abound over the posting of confidential information from eBay members on one of the vendor's discussion forums, a sinister incident that has many of the online marketplace's buyers and sellers worried.
Accounts on Google's Gmail can be easily hacked, allowing any past -- and future e-mail messages -- to be forwarded to the attacker's own in-box, a vulnerability researcher said this week.
Ingram Micro has taken on a range of data capture and tracking solutions from US-based Wasp Barcode Technologies with a view to targeting the productivity needs of smaller businesses.
Security vendor Tumbleweed is slowly covering all its reseller bases around Australia, with Queensland-based Priority 1 Solutions the latest to sign up to its alliance program.