Archive

Study: 40 Percent of Web Surfers Using Leaky, Vintage Browsers

If the food industry ran its business like the Internet browsing software industry, then consumers would be hurling lawsuits like bad tomatoes at the companies that give us Internet Explorer, Firefox and Safari. The comparison is existent in a wide-ranging new study showing that approximately 40 per...

Internet Bigs Back Single Sign-On

It's the bane of anyone who uses the Internet: remembering different user IDs, passwords and registration information for sites you use regularly. Soon, you may not have to. Some of the Internet's biggest players -- Google, Microsoft, Yahoo, IBM and VeriSign -- are working on a new single sign-on th...

IBM Wows Wall Street With Stellar Earnings

IBM posted strong fourth quarter results Monday, beating profits and sales targets as it rode to the rescue of a sagging stock market by providing renewed optimism about technology earnings. Big Blue's profit rose 24 percent to $2.80 per share in the fourth quarter of 2007 while revenue increased 10...

IBM Places $1.5B Bet on Security Push

IBM unveiled a slew of new security products and services and said it would continue to invest heavily in security innovations to address customer needs for a more comprehensive approach to information technology risk. On the heels of a security-related buying spree, Big Blue will spend at least $1....

DVD Jon Wins Bragging Rights for iPhone Activation Hack

The notorious Norwegian hacker, Jon Lech Johansen -- better known as "DVD Jon" for releasing code that broke DVD copy protection in the late 1990s -- has drawn first blood with the iPhone. Johansen has posted a workaround on the Internet that allows iPhone owners to use their devices in a limited fa...

Flaw Found in Snort Intrusion Detection Product

A new vulnerability in Snort, an open source intrusion-detection system, enables hackers to inject hostile code into exposed systems. Sourcefire, the company behind the Snort package, said hackers could remotely gain control of systems running the software and execute malicious code, as well as gain...

Cisco Buys IronPort for $830 Million

In a bid to further broaden its product offerings beyond core Internet gear, Cisco Systems said Thursday it would buy security software marker IronPort in a deal valued at $830 million. Cisco said the cash-and-stock purchase would enable it to extend its "self-defending network" approach to include ...

Report: Microsoft XML Exploit Unpatched and in the Wild

A vulnerability in Microsoft's XML HTTP request-handling can be exploited via an ActiveX control through a Web browser -- specifically Internet Explorer -- according to IBM's Internet Security Systems, which claims to have originally identified the flaw. The vulnerability, which is currently being l...

Macs, Hackers and the Computer Security Game

Computer security is a game of leapfrog in which vendors plug certain vulnerabilities and hackers find new ones. This game has lead to a new platform -- the Macintosh -- becoming the apple of some hackers' eyes. "Recently, there has been a lot of interest among the hacking community in attacking the...

The Changing Faces of Internet Security Threats, Part 2

As the nature of Internet threats has morphed, IT systems professionals and security providers have adapted their response tactics. Increasingly, organizations are developing comprehensive security strategies and implementing a variety of online and on-demand security applications and services acros...

IBM Buys Internet Security Systems for $1.3 Billion

IBM is making yet another splashy acquisition, this time in the data security arena. The computing giant will pay US$1.3 billion to acquire Internet Security Systems, it announced Wednesday. The deal, which values ISS at $28 per share in cash -- an 8 percent premium over the previous day's closing p...

McAfee Security Flaw Highlights Need for Updates

Intrusion detection and prevention systems provider Internet Security Systems (ISS) issued a "protection advisory" targeting older versions of McAfee's anti-virus software engine last Thursday. Attackers are able to trigger a stack overflow within the process importing the McAfee AntiVirus Library,...

‘JpegOfDeath’ Using Windows Weakness To Spread Trojan

Online attackers today are using popular sources of pornographic images to target a recently revealed weakness in Microsoft software and to spread a Trojan that can provide remote access and control of infected computers. Just two weeks after Microsoft warned of a vulnerability in virtually all vers...

Security Vulnerability in Linux Qt Toolkit Fixed

Linux vendors have issued patches to address vulnerability in Qt, a software toolkit that simplifies writing and maintaining GUI applications for the X Window system. The flaw was unveiled by security researcher Chris Evans, who uncovered a heap overflow in the BMP image decoder in Qt versions prior...

Taiwanese Trojan Author Arrested

Police in Taiwan have arrested Wang An-ping, a 30-year-old man who reportedly admitted to authoring Trojan code later used to steal and destroy information on government-owned computers. The arrest marks the second major capture of the week in the information security enforcement arena. Also in cust...

How often do you receive an email that you suspect is fraudulent?
Loading ... Loading ...

LinuxInsider Channels