IT Security

Security bloggers help keep you up to date on how to protect your network through news, updates, advice, and opinions on how you can stay ahead of hackers.

  • Paul Mah // February 3, 2008, 12:24 PM PST

    Security news roundup: February 3

    Here’s a collection of recent security vulnerabilities and alerts, which covers multiple unpatched vulnerabilities in the open sourced Mambo CMS, Gento's vulnerability to DOS and remote exploitation, the availability of an update for a disclosed flaw in the UltraVNC client, a security hole in Cisco's Wireless Control System, Security leaks in IBM's Informix Storage Manager and the release of a Parallel Windows password brute forcing tool.

    0

  • Chad Perrin // February 3, 2008, 7:05 PM PST

    Security is an ecosystem, not a product

    0

  • Mike Mullins // February 7, 2008, 12:50 AM PST

    Pop-up windows: Know the difference between the good, the bad, and the annoying

    Pop-up windows can often be a pain, but they sometimes indicate a more serious problem. Find out how to differentiate between a pop-up that's just wasting your time and one that might be trying to tell you something.

    0

  • David Davis // February 7, 2008, 4:42 AM PST

    Protect your network with the Cisco IOS Firewall

    Why buy another expensive device if your router can also provide firewall functionality? Any "Firewall Feature Set" version of the Cisco IOS contains the IOS Firewall, a built-in firewall inside the Cisco router. Find out what the IOS Firewall can do, and learn how to configure it.

    0

  • Chad Perrin // February 8, 2008, 4:28 AM PST

    Five must-have security resources

    0

  • Paul Mah // February 10, 2008, 3:59 PM PST

    Security news roundup: February 10

    Here’s a collection of recent security vulnerabilities and alerts, which covers a vulnerability in the multiuser version of the popular WordPress, a new release of the Windows client for Skype which fixes several vulnerabilities, critical vulnerabilities found in Sun's Java Runtime Environment, a memory corruption vulnerability found in IBM's DB2 Universal Database Administration Server, a slew of vulnerabilities resolved in SuSE and Microsof's upcoming Patch Tuesday for the month of February.

    0

  • Deb Shinder // February 15, 2008, 2:28 AM PST

    Security threats in a unified world

    Amid all the excitement surrounding the unification of our communications technologies, the issue of security sometimes gets lost in the shuffle. Maybe some are assuming that the threats are the "same old, same old" that plague those same communications methods in their more stand-alone forms. But it's that and more.

    0

  • Chad Perrin // February 15, 2008, 4:40 AM PST

    How private is your Web-based service?

    0

  • Chad Perrin // February 17, 2008, 2:52 PM PST

    Use OpenSSH as a secure Web proxy

    0

  • Paul Mah // February 17, 2008, 3:59 PM PST

    Security news roundup: February 17

    Here's a collection of recent security vulnerabilities and alerts, which covers a serious vulnerability fixed in ClamAV, FreeBSD closing a couple of vulnerabilities, additional flaws discovered in Cisco IP telephony products, critical vulnerabilities found in Adobe Flash Media Server, and how Vista SP1 proves to be a low hurdle to pirates.

    0

  • Paul Mah // February 24, 2008, 3:51 PM PST

    Security news roundup: February 24

    Here’s a collection of recent security vulnerabilities and alerts, which covers Opera releasing an update that patches three security vulnerabilities, multiple flaws found and fixed in EMC RepliStor, Symantec patching Veritas Storage Foundation, the presence of design weaknesses in wireless LAN VoIP handsets, and hard disk enclosures that fails to encrypt data as advertised.

    0

  • Chad Perrin // April 13, 2009, 8:19 AM PST

    10 questions to ask yourself before collecting security data

    As information technologies become more efficient, and as we conceive of more effective ways of using them, the temptation to engage in data collection and analysis grows. Especially when that data relates to security, we should be careful about how we go about collecting it, and whether it is wise to collect it at all.

    0

  • Michael Kassner // April 13, 2009, 9:25 PM PST

    GhostNet: Why it's a big deal

    The Tibetan Government in Exile asked the Information Warfare Monitor consortium to investigate allegations of cyberspying. It appears they've found evidence of spying plus a whole lot more and that should concern all of us.

    0

  • Michael Kassner // April 15, 2009, 4:54 AM PST

    Patch Tuesday: Several updates fix zero-day exploits

    Microsoft's April patch Tuesday is a serious one. Three patches fix zero-day exploits and four fix published exploits. Want to know which ones are which?

    0