Latest security news.Microsoft wraps up Windows XP Service Pack 2, 08/06/04Microsoft has finished work on Service Pack 2 (SP2) for Windows XP, the company said Friday. The software maker now begins the process of delivering the large, security-focused update to users.https://www.nwfusion.com/news/2004/0806microwraps.html?nl IBM tells employees not to install Windows XP update, 08/09/04While developers at Microsoft may be celebrating that they finished work on Service Pack 2 for Windows XP, IT departments around the world now face the question of whether they should update their systems, or not. https://www.nwfusion.com/news/2004/0809ibmtells.html?nlFed up hospitals defy patching rules, 08/09/04Amid growing worries that Windows-based medical systems will endanger patients if Microsoft-issued security patches are not applied, hospitals are rebelling against restrictions from device manufacturers that have delayed or prevented such updates.https://www.nwfusion.com/news/2004/080904patchfights.html?nlWeblog: Trying to patch up an argument, 08/09/04In a world where clinical patient-care systems are more and more integrated into high-speed networks – not unlike enterprise-resource planning systems, for instance – there is growing alarm among IT administrators about the delay in assuring medical devices receive security patches. https://www.nwfusion.com/weblogs/security/005907.html?nlAOL IM ‘Away’ message flaw deemed critical, 08/09/04Computer security companies are warning users of AOL’s Instant Messenger software that a serious security hole in the product could allow remote attackers to execute malicious code on computers that run the popular IM software.https://www.nwfusion.com/news/2004/0809aolima.html?nl Trojan hits Windows PDAs for first time, 08/09/04After finding the third malicious program targeting wireless devices in fewer than 60 days, security specialists are warning that it’s only a matter of time before attackers launch a serious attack against mobile phones and PDAs.https://www.nwfusion.com/news/2004/080904pdavirus.html?nlHack . . . hack back . . . repeat, 08/09/04At DefCon, a game of virtual capture the flag keeps eight teams at the keyboard for 36 hours.https://www.nwfusion.com/news/2004/080904defcon.html?nlNo Zero Day this July, 08/09/04For no apparently technical reason, July has traditionally been a bad month for the security world. But July 2004 was relatively quiet, security-speaking.https://www.nwfusion.com/news/2004/080904defconside.html?nlNew Bagle version spreading, 08/09/04Anti-virus and computer security companies warned Internet users about a new version of the Bagle e-mail worm that was spreading quickly on the Internet Monday.https://www.nwfusion.com/news/2004/0809newbagle.html?nlWeblog: Hacking RFID, 08/10/04RFDump is a Java tool for reading data off RFID chips (when connected to an RFID reader device).https://napps.nwfusion.com/compendium/archive/005919.html?nlDigging into Microsoft’s search efforts, 08/09/04Microsoft’s developing desktop search technology will have to be complemented by a well-defined security framework, or it will become a nightmare when integrated into a corporate collaboration environment, experts say.https://www.nwfusion.com/news/2004/080904mssearch.html?nlReview: CoreStreet scales digital certificates, 08/09/04What’s the point of deploying a digital certificate infrastructure if you can’t readily check the status of certificates? That’s where CoreStreet’s Real Time Credentials comes in.https://www.nwfusion.com/reviews/2004/0809rev.html?nlFitting OCSP into your Certificate Infrastructure, 08/09/04X.509 Digital certificates are used in a variety of security protocols to provide identity management.https://www.nwfusion.com/reviews/2004/0809revside.html?nlFeature: Word up, 08/09/04How do you set your spam filters to block key words when the Viagra mail has to get through?https://www.nwfusion.com/research/2004/0809spam.html?nlOpinion: Controlling access to the network, 08/09/04Understanding that there is no way we can be totally safe, what kind of options should we look at to make sure that only those who should be on our network are able to get on?https://www.nwfusion.com/columnists/2004/0809nutter.html?nlOpinion: Divergent views of e-voting, 08/09/04Electronic voting machines scare the bejesus out of IT security experts, while the general populace finds them no more threatening than an automated teller machine.https://www.nwfusion.com/columnists/2004/080904buzz.html?nlOracle lax in response to security flaws, 08/09/04Oracle has acknowledged the existence of security holes in its database software and said it plans to issue a security alert soon. The U.K. security expert who found the holes criticized Oracle’s conduct, saying the company has sat on patches for about two months that would fix the holes.https://www.nwfusion.com/news/2004/080904oraclesecurity.html?nlVendors shore up ID management tools, 08/09/04Two single sign-on vendors are upgrading their products in an effort to meet the needs of corporate users warming up to identity management.https://www.nwfusion.com/news/2004/080904signon.html?nlMcAfee updates E-Business Server, 08/09/04McAfee Monday said that it is releasing a new version of its E-Business Server data encryption software that it claims will make it easier for companies to encrypt data sent outside their networks, to business partners or remote offices.https://www.nwfusion.com/news/2004/0809mcafeupdat.html?nlOpinion: Our tax dollars, almost at work, 08/09/04About a year and a half ago the U.S. government released the National Strategy to Protect Cyberspace. This report was mostly to get the Department of Homeland Security to organize, support and communicate responses to and protection from attacks on the U.S. cybertechnology infrastructure. Now the DHS Office of Inspector General has issued a report card on how DHS is doing that paints a mixed, but on the whole not very good, picture.https://www.nwfusion.com/columnists/2004/080904bradner.html?nlCheck Point faces up to challenges, 08/09/04You’d think Check Point might be hitting its peak given that network security has become the top priority for so many IT shops. But the firewall/VPN company actually is facing some of its stiffest challenges.https://www.nwfusion.com/news/2004/080904checkpoint.html?nlWeblog: User to Microsoft: No thanks, 08/06/04Edward Mitchell reads a story in which Microsoft asks everybody to turn on Windows XP automatic updating for the upcoming…https://napps.nwfusion.com/compendium/archive/005888.html?nlCorporate America slow to adopt biometric technologies, 08/06/04Biometric authentication technologies, which were expected to be widely adopted soon after the Sept.11 terrorist attacks in 2001, are still struggling to gain broad acceptance in corporate America.https://www.nwfusion.com/news/2004/0806biometric.html?nlSmall security firm puts spotlight on big vendor bugs, 08/06/04News earlier this week that Oracle was sitting on patches for 34 undisclosed vulnerabilities in its database software may have come as a surprise to some, but not to David Litchfield, the researcher who discovered the holes.https://www.nwfusion.com/news/2004/0806smallsecur.html?nlNewsletter: Data Encryption Standard no longer up for the job, 08/05/04It’s the end of an era for one form of VPN encryption: the federal government says that simple Data Encryption Standard can no longer stand up against brute-force attacks.https://www.nwfusion.com/newsletters/vpn/2004/0802vpn2.html?nlNewsletter: Book details security analysis, 08/05/04One of the textbooks I chose for Seminar 5 of Norwich University’s graduate program in information assurance is “Performing Security Analyses of Information Systems” by Charles L. Smith Sr.https://www.nwfusion.com/newsletters/sec/2004/0802security2.html?nlWeblog: Know your enemy, 08/05/04Read up on a plan for bypassing all those pesky firewalls, proxies and content filters you’re so busy running.https://napps.nwfusion.com/compendium/archive/005884.html?nlSecurity expert Q&A: The virus writers are winning, 08/04/04Mikko Hyppönen has made a name for himself as a computer security expert in directing anti-virus research at Finland’s F-Secure, a $45 million company that regularly issues alerts warning of network threats. He spoke recently with Network World News Editor Bob Brown and Features Editor Neal Weinberg about the latest viruses and what enterprise network executives are up against.https://www.nwfusion.com/news/2004/0804fsecure.html?nlMicrosoft issues alert on CRM suite, 08/04/04Microsoft has issued an alert about incompatibility issues in its customer relationship management suite caused by installing the Windows XP Service Pack 2.https://www.nwfusion.com/news/2004/0804microissue.html?nlNewsletter: How secure are your management systems?, 08/04/04Most management systems today rely on agent technology that interacts with software on servers. So what would happen if malicious hackers targeted the agent or server software to gain access to the management system? Would they be able to do anything? See anything?https://www.nwfusion.com/newsletters/nsm/2004/0802nsm2.html?nlNewsletter: Linux systems are sealed tight, among Linux software developers anyway, 08/04/04A recent survey of developers who use Linux-based machines found that viruses and hack attacks are very rare occurrences for this subset of the IT world.https://www.nwfusion.com/newsletters/linux/2004/0802linux2.html?nlNewsletter: CIRT Management: Beyond technical expertise, 08/03/04In this installment of my continuing series on Computer Incident Response Team management, I’ll address the expertise needed for various functions in the CIRT and the attitude CIRT members should adopt when working with users.https://www.nwfusion.com/newsletters/sec/2004/0802sec1.html?nl Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Cloud Computing Networking Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe