Security News & Reviews - Page 1327

More Security News

Badtrans.B Worm Spreading Fast

|
A fast-spreading e-mail worm infected thousands of home users over the Thanksgiving holiday weekend and began spreading in enterprises as well early last week.

Keeping Up With Windows Fixes

|
For large enterprises, sorting through Microsoft Corp.'s bulletins on its latest security fixes and then determining which machines need what hot fix can be complex and time-consuming.

Freeing Up the Network Bottlenecks

|
Nortel's Alteon Security Cluster targets firewalls and other security apps.

Survey: Even After Sept. 11, Security Lags

|
Corporate IT largely remains unprepared for preventing and overcoming breaches of information security despite the terrorist attacks of Sept. 11, a recent survey found.

Privacy Quiz Questioned

|
Microsoft defends its motive for questionnaire against criticism from EPIC, other advocacy groups.

Security Flaws in Popular FTP Daemon Exposed

|
The two weaknesses in versions 2.5.0, 2.6.0 and 2.6.1 of the server have been the subject of much discussion in the last few days on security mailing lists and Web sites and an exploit for one of the flaws has been making the rounds as well

Microsoft Issues Privacy Quiz

|
The tool takes the form of an interactive 10-question quiz that puts the user into one of six categories based on his answers

Nortel Looks to Ease Security Bottlenecks

|
Known collectively as the Alteon Security Cluster, the products include the Alteon Web Switch, Alteon Security Appliances and custom software

Stay Focused on End-Of-Year Priorities

|
If you are looking for the three it trends that will be the hallmarks for the rest of the year, you might want to keep the letter "s" in mind.

IBMs Pearson: Time to Tackle Privacy Is Now

|
Recently, IBM formed a first-of-its-kind Privacy Management Council, to examine the technologies and management practices that will be needed to protect consumer privacy.

Tool Measures W2K Security

|
Administrators who want to measure how well their Windows 2000 servers are secured will find a free security scanner from the not-for-profit Center for Internet Security a real help.

5 Steps to Enterprise Security - Step 3: Detection

|
Human touch turns log files into leads that block attacks on IT.

Enterprise Tech Videos