News (Page 2 of 71)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >
Experts: U.S. needs to defend its "cyber turf"
The United States must develop a Monroe Doctrine for the Internet, defining what constitutes its cyberspace and pledging to defend its virtual borders, security experts told Congress.
By: Robert Lemos, SecurityFocus 2009-03-11

Advisor: U.S. needs policy to defend cyberspace
An Obama transition-team member argues that any future cyber policy needs to deal with the role of the intelligence community, the militarization of cyberspace and designating a lead disaster agency.
By: Robert Lemos, SecurityFocus 2009-02-19

Cabal forms to fight Conficker, offers bounty
Microsoft offers $250,000 for information leading to the arrest of the author and, along with security firms and Internet service providers, pledges to work to prevent the prolific worm from spreading further.
By: Robert Lemos, SecurityFocus 2009-02-13

Group releases list to kill most-dangerous bugs
Software makers, security vendors, and government agencies team up to create a list of the 25 most severe software issues, aiming to get developers to stop making mistakes.
By: Robert Lemos, SecurityFocus 2009-01-13

Group attacks flaw in browser crypto security
A group of researchers warns browser makers and certificate authorities to drop support for MD5 digital signatures, after successfully creating a fake, but valid, certificate.
By: Robert Lemos, SecurityFocus 2008-12-30

Commission calls for cybersecurity czar
A group of technology and government experts warns that, without significant changes to the U.S. approach to cyberspace, foreign companies and other nations will continue to steal valuable technologies.
By: Robert Lemos, SecurityFocus 2008-12-08

Microsoft hopes free security means less malware
The software giant says shutting down Windows Live OneCare to release the software as a free tool could make consumers more secure.
By: Robert Lemos, SecurityFocus 2008-11-20

Researchers find more flaws in wireless security
Two security experts plan to show a limited attack against the popular Wi-Fi Protected Access (WPA) -- a replacement for insecure WEP -- at a conference in Tokyo.
By: Robert Lemos, SecurityFocus 2008-11-06

Secure hash competition kicks off
Dozens of amateur and professional cryptographers have joined the United States' first open competition for creating an uncrackable algorithm for generating hashes -- the digital fingerprints widely used in a variety of security functions.
By: Robert Lemos, SecurityFocus 2008-11-03

You don't know (click)jack
Security professionals Robert "RSnake" Hansen and Jeremiah Grossman discuss a class of attacks, known as clickjacking, on user interfaces of Web browsers.
By: Robert Lemos, SecurityFocus 2008-10-15

News (Page 2 of 71)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >


Privacy Statement
Copyright 2010, SecurityFocus