Americas

  • United States

Microsoft wraps up Windows XP Service Pack 2

Opinion
Aug 11, 20048 mins
Networking

Latest security news.

Microsoft wraps up Windows XP Service Pack 2, 08/06/04

Microsoft has finished work on Service Pack 2 (SP2) for Windows XP, the company said Friday. The software maker now begins the process of delivering the large, security-focused update to users.

https://www.nwfusion.com/news/2004/0806microwraps.html?nl

IBM tells employees not to install Windows XP update, 08/09/04

While developers at Microsoft may be celebrating that they finished work on Service Pack 2 for Windows XP, IT departments around the world now face the question of whether they should update their systems, or not.

https://www.nwfusion.com/news/2004/0809ibmtells.html?nl

Fed up hospitals defy patching rules, 08/09/04

Amid growing worries that Windows-based medical systems will endanger patients if Microsoft-issued security patches are not applied, hospitals are rebelling against restrictions from device manufacturers that have delayed or prevented such updates.

https://www.nwfusion.com/news/2004/080904patchfights.html?nl

Weblog: Trying to patch up an argument, 08/09/04

In a world where clinical patient-care systems are more and more integrated into high-speed networks – not unlike enterprise-resource planning systems, for instance – there is growing alarm among IT administrators about the delay in assuring medical devices receive security patches.

https://www.nwfusion.com/weblogs/security/005907.html?nl

AOL IM ‘Away’ message flaw deemed critical, 08/09/04

Computer security companies are warning users of AOL’s Instant Messenger software that a serious security hole in the product could allow remote attackers to execute malicious code on computers that run the popular IM software.

https://www.nwfusion.com/news/2004/0809aolima.html?nl

Trojan hits Windows PDAs for first time, 08/09/04

After finding the third malicious program targeting wireless devices in fewer than 60 days, security specialists are warning that it’s only a matter of time before attackers launch a serious attack against mobile phones and PDAs.

https://www.nwfusion.com/news/2004/080904pdavirus.html?nl

Hack . . . hack back . . . repeat, 08/09/04

At DefCon, a game of virtual capture the flag keeps eight teams at the keyboard for 36 hours.

https://www.nwfusion.com/news/2004/080904defcon.html?nl

No Zero Day this July, 08/09/04

For no apparently technical reason, July has traditionally been a bad month for the security world. But July 2004 was relatively quiet, security-speaking.

https://www.nwfusion.com/news/2004/080904defconside.html?nl

New Bagle version spreading, 08/09/04

Anti-virus and computer security companies warned Internet users about a new version of the Bagle e-mail worm that was spreading quickly on the Internet Monday.

https://www.nwfusion.com/news/2004/0809newbagle.html?nl

Weblog: Hacking RFID, 08/10/04

RFDump is a Java tool for reading data off RFID chips (when connected to an RFID reader device).

https://napps.nwfusion.com/compendium/archive/005919.html?nl

Digging into Microsoft’s search efforts, 08/09/04

Microsoft’s developing desktop search technology will have to be complemented by a well-defined security framework, or it will become a nightmare when integrated into a corporate collaboration environment, experts say.

https://www.nwfusion.com/news/2004/080904mssearch.html?nl

Review: CoreStreet scales digital certificates, 08/09/04

What’s the point of deploying a digital certificate infrastructure if you can’t readily check the status of certificates? That’s where CoreStreet’s Real Time Credentials comes in.

https://www.nwfusion.com/reviews/2004/0809rev.html?nl

Fitting OCSP into your Certificate Infrastructure, 08/09/04

X.509 Digital certificates are used in a variety of security protocols to provide identity management.

https://www.nwfusion.com/reviews/2004/0809revside.html?nl

Feature: Word up, 08/09/04

How do you set your spam filters to block key words when the Viagra mail has to get through?

https://www.nwfusion.com/research/2004/0809spam.html?nl

Opinion: Controlling access to the network, 08/09/04

Understanding that there is no way we can be totally safe, what kind of options should we look at to make sure that only those who should be on our network are able to get on?

https://www.nwfusion.com/columnists/2004/0809nutter.html?nl

Opinion: Divergent views of e-voting, 08/09/04

Electronic voting machines scare the bejesus out of IT security experts, while the general populace finds them no more threatening than an automated teller machine.

https://www.nwfusion.com/columnists/2004/080904buzz.html?nl

Oracle lax in response to security flaws, 08/09/04

Oracle has acknowledged the existence of security holes in its database software and said it plans to issue a security alert soon. The U.K. security expert who found the holes criticized Oracle’s conduct, saying the company has sat on patches for about two months that would fix the holes.

https://www.nwfusion.com/news/2004/080904oraclesecurity.html?nl

Vendors shore up ID management tools, 08/09/04

Two single sign-on vendors are upgrading their products in an effort to meet the needs of corporate users warming up to identity management.

https://www.nwfusion.com/news/2004/080904signon.html?nl

McAfee updates E-Business Server, 08/09/04

McAfee Monday said that it is releasing a new version of its E-Business Server data encryption software that it claims will make it easier for companies to encrypt data sent outside their networks, to business partners or remote offices.

https://www.nwfusion.com/news/2004/0809mcafeupdat.html?nl

Opinion: Our tax dollars, almost at work, 08/09/04

About a year and a half ago the U.S. government released the National Strategy to Protect Cyberspace. This report was mostly to get the Department of Homeland Security to organize, support and communicate responses to and protection from attacks on the U.S. cybertechnology infrastructure. Now the DHS Office of Inspector General has issued a report card on how DHS is doing that paints a mixed, but on the whole not very good, picture.

https://www.nwfusion.com/columnists/2004/080904bradner.html?nl

Check Point faces up to challenges, 08/09/04

You’d think Check Point might be hitting its peak given that network security has become the top priority for so many IT shops. But the firewall/VPN company actually is facing some of its stiffest challenges.

https://www.nwfusion.com/news/2004/080904checkpoint.html?nl

Weblog: User to Microsoft: No thanks, 08/06/04

Edward Mitchell reads a story in which Microsoft asks everybody to turn on Windows XP automatic updating for the upcoming…

https://napps.nwfusion.com/compendium/archive/005888.html?nl

Corporate America slow to adopt biometric technologies, 08/06/04

Biometric authentication technologies, which were expected to be widely adopted soon after the Sept.11 terrorist attacks in 2001, are still struggling to gain broad acceptance in corporate America.

https://www.nwfusion.com/news/2004/0806biometric.html?nl

Small security firm puts spotlight on big vendor bugs, 08/06/04

News earlier this week that Oracle was sitting on patches for 34 undisclosed vulnerabilities in its database software may have come as a surprise to some, but not to David Litchfield, the researcher who discovered the holes.

https://www.nwfusion.com/news/2004/0806smallsecur.html?nl

Newsletter: Data Encryption Standard no longer up for the job, 08/05/04

It’s the end of an era for one form of VPN encryption: the federal government says that simple Data Encryption Standard can no longer stand up against brute-force attacks.

https://www.nwfusion.com/newsletters/vpn/2004/0802vpn2.html?nl

Newsletter: Book details security analysis, 08/05/04

One of the textbooks I chose for Seminar 5 of Norwich University’s graduate program in information assurance is “Performing Security Analyses of Information Systems” by Charles L. Smith Sr.

https://www.nwfusion.com/newsletters/sec/2004/0802security2.html?nl

Weblog: Know your enemy, 08/05/04

Read up on a plan for bypassing all those pesky firewalls, proxies and content filters you’re so busy running.

https://napps.nwfusion.com/compendium/archive/005884.html?nl

Security expert Q&A: The virus writers are winning, 08/04/04

Mikko Hyppönen has made a name for himself as a computer security expert in directing anti-virus research at Finland’s F-Secure, a $45 million company that regularly issues alerts warning of network threats. He spoke recently with Network World News Editor Bob Brown and Features Editor Neal Weinberg about the latest viruses and what enterprise network executives are up against.

https://www.nwfusion.com/news/2004/0804fsecure.html?nl

Microsoft issues alert on CRM suite, 08/04/04

Microsoft has issued an alert about incompatibility issues in its customer relationship management suite caused by installing the Windows XP Service Pack 2.

https://www.nwfusion.com/news/2004/0804microissue.html?nl

Newsletter: How secure are your management systems?, 08/04/04

Most management systems today rely on agent technology that interacts with software on servers. So what would happen if malicious hackers targeted the agent or server software to gain access to the management system? Would they be able to do anything? See anything?

https://www.nwfusion.com/newsletters/nsm/2004/0802nsm2.html?nl

Newsletter: Linux systems are sealed tight, among Linux software developers anyway, 08/04/04

A recent survey of developers who use Linux-based machines found that viruses and hack attacks are very rare occurrences for this subset of the IT world.

https://www.nwfusion.com/newsletters/linux/2004/0802linux2.html?nl

Newsletter: CIRT Management: Beyond technical expertise, 08/03/04

In this installment of my continuing series on Computer Incident Response Team management, I’ll address the expertise needed for various functions in the CIRT and the attitude CIRT members should adopt when working with users.

https://www.nwfusion.com/newsletters/sec/2004/0802sec1.html?nl