Bot software looks to improve peerage
Threatened by investigators' ability to tap into chat-based command-and-control networks, bot masters increasingly look to peer-to-peer communications, encryption and other technologies to hide their tracks. 2006-05-02 http://www.securityfocus.com/news/11390 Breach case could curtail Web flaw finders Security researchers and legal experts voice concern over the prosecution of an information-technology professional for computer intrusion after he allegedly breached a university's online application system while researching a flaw without the school's permission. 2006-04-26 http://www.securityfocus.com/news/11389 E-mail authentication gaining steam A host of software companies, security firms and Internet service providers meet in Chicago to urge corporations and bulk e-mail senders to adopt authentication technologies. 2006-04-20 http://www.securityfocus.com/news/11388 Browsers feel the fuzz Security researchers are starting to aim network fuzzers away from servers and toward browsers, finding that dozens of flaws have been missed. 2006-04-12 http://www.securityfocus.com/news/11387 Groups argue over merits of flaw bounties Vulnerability researchers like getting paid for their research, but software companies criticize the programs. Do vulnerability-purchasing initiatives make sense? 2006-04-05 http://www.securityfocus.com/news/11386 Seven arrested in online fraud crackdown An ongoing investigation, dubbed Operation Rolling Stone by the U.S. Secret Service, has turned up links to the massive debit-card breaches that have worried banks and consumers. 2006-03-31 http://www.securityfocus.com/news/11385 Patches released for zero-day IE threat UPDATE: As hundreds of malicious Web sites attempt to exploit the most critical of two Internet Explorer flaws disclosed last week, two third-party firms release fixes to nix the threat. See also: Thousands download third-party patches 2006-03-28 http://www.securityfocus.com/news/11384 Microsoft offers Apple security advice Microsoft giving advice to Apple on software security? What next, a lecture on timely shipping of product? 2006-03-24 http://www.securityfocus.com/news/11383 Check Point calls off Sourcefire buy Citing an ongoing investigation into the deal by the U.S. Treasury Department, the companies decide to call it quits. 2006-03-24 http://www.securityfocus.com/news/11382 Debit-card fraud underscores legal loopholes UPDATE: Three major data leaks in the last six months are likely responsible for a recent spate of debit-card fraud, but in two cases, no one has come forward to take responsibility. Under current state laws, such silence may be legal. 2006-03-20 http://www.securityfocus.com/news/11381 |
|
Privacy Statement |