Cyber Security Institute

Friday, July 30, 2004

How to Tackle the Threat from Portable Storage Devices

Gartner advises companies to take action against the risks that portable storage devices (flash drives, MP3 players, and so on) present to the enterprise.  Giving your staff free rein to use them at work could lead to breaches of security and loss of data.

MORE... (0) Comments

Wednesday, July 28, 2004

Details of Microsoft antivirus software leak out

An executive of Microsoft in France divulged on Wednesday some of the software maker’s plans for its highly anticipated entry into the antivirus software market.

MORE... (0) Comments

Monday, July 26, 2004

2004: A dreadful half-year for malware

Figures released recently by McAfee shone a light on the increasing number of security threats faced by businesses and individual Web users.

MORE... (0) Comments

Security Beats Holding Down Costs In IT Concerns

Security has surpassed cost-control and cost-containment in topping the list of challenges for information technology units, a market researcher said recently.

MORE... (0) Comments

Saturday, July 24, 2004

Six software firewalls reviewed and rated

There is no excuse for failing to protect data on a network and there are plenty of options on the market Earlier this year we tested the hardware products and now it is the turn of the software firewall.

MORE... (0) Comments

Monday, July 19, 2004

Cisco Fortifies WLAN Security

Cisco Systems Inc. is preparing to introduce products to its WLAN line that add support for AES, among other security and management features.

MORE... (0) Comments

Friday, July 16, 2004

Worried firms consider email boycott

Six out of 10 companies claim they will give up email if the threat posed by viruses, spam and other unwanted content is not contained and a viable alternative emerges.

MORE... (0) Comments

Thursday, July 15, 2004

Security tops network wish list

Nearly eight out of 10 companies rate security as the single most important attribute of corporate networks, according to new research.

MORE... (0) Comments

Tuesday, July 13, 2004

Companies adapt to a zero day world

Financial institutions with critical systems and cash on the line are reorganizing to deal with the closing gap between the hole and the patch.  Case in point, the June 25th Russian attacks that turned IIS servers into delivery platforms for identity-thieving Trojan keystroke loggers.  The attacks relied on two vulnerabilities in Internet Explorer that security researchers discovered for the first time weeks earlier on a malicious adware-implanting website.  At the time of the attack, no patch was available.  But the episode proved that the zero day concern is more than hyperbole.

MORE... (0) Comments

Companies adapt to a zero day world

Financial institutions with critical systems and cash on the line are reorganizing to deal with the closing gap between the hole and the patch.

MORE... (0) Comments

Microsoft Delays By a Year Delivery of Two New Patching Systems

Microsoft is delaying by a full year two of its four software patching/upgrade systems, company officials told those attending the worldwide partner conference here.

MORE... (0) Comments

Monday, July 12, 2004

Metasploit Framework (Part One of Three) - The Prometheus Of Exploitation (Technical article)

The network security administrator needs to be more vigilant then ever before as the enemy is always one step ahead with the latest exploit in his hand.  With a complete exploit environment, working exploits, effectual payloads and added handlers, this is one tool which the penetration testers must utilize.

MORE... (0) Comments

Cost dictates security plans

Businesses across the globe believe that their operations are under greater threat than ever before.  But findings from the Global Information Security Survey, which questioned 7,000 business technology and security professionals in 40 countries, highlights the primitive measures being used to defend against a significant menace.

MORE... (0) Comments

IE’s Market Share Drops, Security Gaffes To Blame

The recent wave of security holes in Internet Explorer—and calls by experts and analysts to switch to another browser—are having an effect on Microsoft’s market share, WebSideStory, a San Diego Web measurement supplier said.

MORE... (0) Comments

Wednesday, July 07, 2004

Cover Your Apps - 5 Security Myths

Like water, hackers take the path of least resistance. Today, this path leads over Secure Sockets Layer (SSL) to get past most corporate firewalls, where nothing exists between a hacker, a Web site and the information it holds. Using a browser and a few simple tricks, hackers can penetrate a Web site.

MORE... (0) Comments

The attack of the US$2 million worm

Internet-based business disruptions triggered by worms and viruses are costing companies an average of nearly US$2 million in lost revenue per incident, according to market researcher Aberdeen.

MORE... (0) Comments