News (Page 20 of 238)   < Prev  15 16 17 18 19 20 21 22 23 24 25  Next >
Bot software looks to improve peerage
Threatened by investigators' ability to tap into chat-based command-and-control networks, bot masters increasingly look to peer-to-peer communications, encryption and other technologies to hide their tracks.
By: Robert Lemos, SecurityFocus 2006-05-02
http://www.securityfocus.com/news/11390

Breach case could curtail Web flaw finders
Security researchers and legal experts voice concern over the prosecution of an information-technology professional for computer intrusion after he allegedly breached a university's online application system while researching a flaw without the school's permission.
By: Robert Lemos, SecurityFocus 2006-04-26
http://www.securityfocus.com/news/11389

E-mail authentication gaining steam
A host of software companies, security firms and Internet service providers meet in Chicago to urge corporations and bulk e-mail senders to adopt authentication technologies.
By: Robert Lemos, SecurityFocus 2006-04-20
http://www.securityfocus.com/news/11388

Browsers feel the fuzz
Security researchers are starting to aim network fuzzers away from servers and toward browsers, finding that dozens of flaws have been missed.
By: Robert Lemos, SecurityFocus 2006-04-12
http://www.securityfocus.com/news/11387

Groups argue over merits of flaw bounties
Vulnerability researchers like getting paid for their research, but software companies criticize the programs. Do vulnerability-purchasing initiatives make sense?
By: Robert Lemos, SecurityFocus 2006-04-05
http://www.securityfocus.com/news/11386

Seven arrested in online fraud crackdown
An ongoing investigation, dubbed Operation Rolling Stone by the U.S. Secret Service, has turned up links to the massive debit-card breaches that have worried banks and consumers.
By: Robert Lemos, SecurityFocus 2006-03-31
http://www.securityfocus.com/news/11385

Patches released for zero-day IE threat
UPDATE: As hundreds of malicious Web sites attempt to exploit the most critical of two Internet Explorer flaws disclosed last week, two third-party firms release fixes to nix the threat.
See also: Thousands download third-party patches
By: Robert Lemos, SecurityFocus 2006-03-28
http://www.securityfocus.com/news/11384

Microsoft offers Apple security advice
Microsoft giving advice to Apple on software security? What next, a lecture on timely shipping of product?
By: Gavin Clarke, The Register 2006-03-24
http://www.securityfocus.com/news/11383

Check Point calls off Sourcefire buy
Citing an ongoing investigation into the deal by the U.S. Treasury Department, the companies decide to call it quits.
By: Robert Lemos, SecurityFocus 2006-03-24
http://www.securityfocus.com/news/11382

Debit-card fraud underscores legal loopholes
UPDATE: Three major data leaks in the last six months are likely responsible for a recent spate of debit-card fraud, but in two cases, no one has come forward to take responsibility. Under current state laws, such silence may be legal.
By: Robert Lemos, SecurityFocus 2006-03-20
http://www.securityfocus.com/news/11381

News (Page 20 of 238)   < Prev  15 16 17 18 19 20 21 22 23 24 25  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus