ORLANDO, Florida—Cyber-security and counterterrorism analyst Roger Cressey on Monday pleaded with IT executives not to underestimate the threat of “national cyber-event” targeting critical infrastructure in the United States. During a keynote address at the InfoSec World 2005 conference here, Cressey warned against discounting the danger of the Internet being used in a terrorist-related attack. “It […]
Earlier this week, when anti-spyware vendor eTrust PestPatrol temporarily removed detections for eight adware applications marketed by Claria, the move caused many a raised eyebrow among anti-spyware advocates. PestPatrol said Friday it would relist all of the Claria Corp. applications on its threat database after a one-week Vendor Appeal Process, but the absence of a […]
A pair of newly discovered security flaws in Microsofts Internet Explorer and Outlook programs could put millions of users at risk of code execution attacks, a private research outfit warned Thursday. The vulnerabilities were reported to Microsoft Corp. by private research outfit eEye Digital Security, and basic details on the risks and the affected products […]
Security experts on Wednesday recommended that IT administrators clearly identify and understand the security risks associated with large-scale grid computing deployments. During Ziff Davis Medias Enterprise Solutions Virtual Tradeshow, the pros and cons of grid computing and safe data storage took center stage, with panelists stressing the importance of using best practices to protect the […]
“Stop. You must dial 911 from another telephone. 911 is not available from this telephone line. No emergency personnel will be dispatched.” Thats the message that greets users of Vonage Holding Corp.s broadband phone service unless 911 calling is manually activated at the subscriber end. Does Vonage do a good-enough job of telling consumers that […]
Struggling to cope with a dramatic rise in malicious hacker intrusions, a group of 18 network providers and ISPs on Monday announced plans to share real-time data on cyber-attacks. The vendors, which include Cisco Systems Inc., British Telecommunication Plc., EarthLink Inc., MCI Inc. and XO Communications Inc., have formed the Fingerprint Sharing Alliance to automate […]
Microsoft Corp.s application of a mandatory “Security Development Lifecycle” for all its Internet-facing products has “significantly reduced” the number—and severity—of security vulnerabilities, according to a white paper released by the software giant. The 19-page document, titled The Trustworthy Computing Security Development Lifecycle, outlines the “cradle to grave” procedures used for software creation at Microsoft. According […]
Last June, when anti-virus researchers reported the discovery of the first proof-of-concept cell phone virus, analysts and experts immediately predicted a coming wave of malware targeting high-end mobile devices. Since then, the warnings have been coming fast and furious. According to the experts, the original proof-of-concept code quickly evolved into Cabir, a worm capable of […]
Microsoft Corp. plans to fit out-of-the-box NAP capabilities into the Longhorn client due out in 2006. Thats the word from Jawad Khaki, corporate vice president of Microsofts networking and devices technologies division. During an hourlong Web chat to share details on Longhorn Networking, Khaki disclosed that the Longhorn client will ship with capabilities to enforce […]
The Mozilla Foundation on Wednesday shipped a new version of its flagship Firefox Web browser to patch a serious security hole that could put users at risk of computer takeover. The flaw, which was discovered and reported by Internet Security Systems Inc., causes a buffer overflow because of the way GIF files are processed by […]