| Old Articles: <Older 1271-1280 Newer> |
 |
InternetNews February 27, 2004 Jim Wagner |
P2P Makes its Business Case Makers of file-sharing software stress convenience and savings, but IT decision-makers fret about losing control of their networks.  |
InternetNews February 27, 2004 Jim Wagner |
IE Frame Exploit Grabs Keystrokes iDefense warns of an exploit that can grab login and password information from Web surfers.  |
InternetNews February 26, 2004 Michael Singer |
The Net Has An 'Insecurity' Complex RSA's second annual assessment of online security leaves little doubt that corporations have a long way to go.  |
InternetNews February 26, 2004 Sean Michael Kerner |
Worms Continue to Wriggle, Wreak Havoc 'Zero-day' exploits and new styles of viruses send security firms scrambling to patch the latest holes in the network.  |
PC Magazine March 16, 2004 Leon Erlanger |
The Weakest Link Even the best-protected networks are vulnerable if employees unwittingly divulge sensitive information.  |
PC Magazine March 16, 2004 Leon Erlanger |
Five Tricks Hackers Use on You 5 tricks to what out for that hackers use to access your system.  |
PC Magazine March 16, 2004 Leon Erlanger |
Hacked in a Flash Tiny USB drives offer unparalleled convenience to all sorts of users--including data thieves.  |
PC Magazine March 16, 2004 |
The Lookout: VoIP Vulnerable Applications such as Voice over IP telephony and videoconferencing could be vulnerable to security breaches because of flaws in the way a major telephony standard is being used.  |
InternetNews February 25, 2004 Susan Kuchinskas |
WS-I: Best Security Practices for Web Services Industry group's working draft is another advance toward interoperability on secure messaging techniques. The draft document identifies security challenges and threats to security with Web services and outlines best practices for dealing with them.  |
The Motley Fool February 25, 2004 Alyce Lomax |
Microsoft's Homeland Security Microsoft at a security conference yesterday addressed security concerns by discussing a string of "active protection" initiatives to make its products safer. It makes sense that all eyes would be on the technology giant's security plans, considering its recent rep as needing a security boost.  |
| <Older 1271-1280 Newer> Return to current articles. |