Latest security news.Technology Insider: Web application security, 05/17/04The battle between hackers and security professionals has moved from the network layer to the Web applications themselves.https://www.nwfusion.com/techinsider/2004/0517techinsider.html?nl Redmond enlists security vendors to automate policy compliance, 05/17/04Microsoft is working with anti-virus vendors to ensure that in the future its software will be able to verify a user’s desktop is secure and updated anti-virus signatures are in place before granting access to corporate resources. https://www.nwfusion.com/news/2004/0517mssecurity.htmlBluetooth’s sprawl heightens security concerns, 05/17/04A number of basically trivial but still troubling Bluetooth exploits prompted the Bluetooth Special Interest Group, a vendor group, last week to hold a teleconference on security.https://www.nwfusion.com/news/2004/0517bluetooth.html?nlNew evidence points to Cisco network hack, 05/18/04More details about the computer code stolen from Cisco surfaced on Tuesday, including new samples of the source code and information on how the code was distributed, four days after a Russian Web site reported news of the theft and posted sample code files to support the claim. Honeypot on a disk, 05/18/04Honeywall CDROM is a bootable honeypot that lets you see what would-be intruders are up to.https://napps.nwfusion.com/compendium/archive/005145.html?nlTransmeta targets Pentium M users with NX security bit, 05/17/04 Upcoming versions of Transmeta’s Efficeon chips will support the NX (No Execute) feature enabled by Microsoft’s upcoming Windows XP Service Pack 2 release, but Intel’s Pentium M processor won’t be ready for NX technology until 2005, representatives from both companies confirmed Monday.https://www.nwfusion.com/news/2004/0517transtarge.html?nlEU seeks quantum cryptography response to Echelon, 05/17/04The European Union is to invest €11 million ($13 million) over the next four years to develop a secure communication system based on quantum cryptography, using physical laws governing the universe on the smallest scale to create and distribute unbreakable encryption keys, project coordinators said Monday.https://www.nwfusion.com/news/2004/0517euseeks.html?nlThe Enforcers, 05/17/04For years, network managers have said they’d like to be able to require anyone coming onto their corporate networks have up-to-date anti-virus signatures and software patches. Finding a way to enforce that security policy is the hard part. But with the innovations underway in the high-tech industry, it looks like that the network-based “security check” could become a far more commonplace practice.https://www.nwfusion.com/weblogs/security/005122.html?nlStart-up reveals NIC-styled encryption, 05/17/04Start-up Seclarity last week unveiled a security-based network interface card called SiNic that customers can use for peer-to-peer encryption and firewall protection for desktops and servers.https://www.nwfusion.com/news/2004/0517seclarity.html?nlApplication firewall appliances: Defending servers from HTTP-based attacks, 05/17/04To keep tabs on the emerging Web application firewall market, we recently reviewed two of the appliance-oriented offerings in this market.https://www.nwfusion.com/techinsider/2004/0517techinsiderrev.html?nlAll-out blitz against Web app attacks, 05/17/04Armed with Web application firewalls, intrusion-protection systems and vulnerability scanners, companies can defend against app-level cyberattacks.https://www.nwfusion.com/techinsider/2004/0517techinsidermain.html?nlQuick tips for Web application security, 05/17/04Sharpen your pencils: It’s time for Web Application Security 101.https://www.nwfusion.com/techinsider/2004/0517techinsidertips.html?nlWeb application firewall buyer’s guide, 05/17/04Detailed data on Web application firewalls.https://www.nwfusion.com/bg/2004/appsecurity/index.jsp?nlForced admissions of poor security, 05/17/04There does seem to have been a cluster of security problems in San Diego, but maybe the reality is that this type of exposure is quite commonplace.https://www.nwfusion.com/columnists/2004/0517bradner.html?nlWorry, worry, worry, worry, 05/17/04So, if I have been rejecting patches offered through Microsoft’s automatic Windows update system because I don’t use Outlook Express, am I potentially, to use a technical IT term, screwed?https://www.nwfusion.com/columnists/2004/0517backspin.html?nlMostly an issue of trust, 05/17/04Johnny Carson’s first national TV gig was as host (from 1957 to 1962) of a game show called “Who Do You Trust?” It was patterned after the earlier Groucho Marx show called “You Bet Your Life.”https://www.nwfusion.com/columnists/2004/0517kearns.html?nlProtecting data in an open WLAN environment, 05/17/04What is the best way to protect data in an open environment (i.e. education), where IT has little control over clients (i.e. operating system, manufacturer, etc.)?https://www.nwfusion.com/columnists/2004/0517wizards.html?nlLearning more about how viruses and worms work, 05/17/04Is there a way I can learn more about how viruses and worms work to possibly find ways of better protecting our network?https://www.nwfusion.com/columnists/2004/0517nutter.html?nlAgobot Trojan author released in Germany, 05/14/04A 21-year-old man who was arrested in Germany last Friday and charged with creating a malicious computer program called Agobot was released from police custody Friday.https://www.nwfusion.com/news/2004/0514agobotrojan.html?nlFortinet to launch homegrown content-filtering service, 05/14/04Fortinet is introducing a second content-filtering service to its multi-function security hardware – this time it’s home-grown.https://www.nwfusion.com/news/2004/0514fortinet.html?nlWallon worm uses Yahoo, Microsoft to spread, 05/13/04Anti-virus software companies issued warnings and software updates on Tuesday and Wednesday for a new worm, Wallon, that uses deceptive Web links to Yahoo.com to trick users into downloading malicious programs.https://www.nwfusion.com/news/2004/0513walloworm.html?nlCritical 802.11 wireless flaw identified, 05/13/04A serious wireless network technology flaw that could lead to the breakdown of some critical infrastructures in just five seconds has been identified by Queensland University of Technology’s (QUT) Information Security Research Centre, a finding that is likely to have worldwide ramifications.https://www.nwfusion.com/news/2004/0513critical.html?nlFurther Sasser arrests but no charges in Germany, 05/13/04Police in Lower Saxony, Germany, arrested five young men on Tuesday in connection with the Sasser Internet worm but all have been released without charge, a police spokesman said Thursday.https://www.nwfusion.com/news/2004/0513furthsasse.html?nlNew worm targets Sasser code flaw, 05/13/04A new Internet worm is spreading by exploiting a flaw in the Sasser worm, according to an alert issued Thursday.https://www.nwfusion.com/news/2004/0513newworm.html?nlCyberguard adds URL filtering to security arsenal, 05/13/04Cyberguard is continuing its pursuit of technologies to add to its core firewall VPN gear, with the latest being URL filtering.https://www.nwfusion.com/newsletters/vpn/2004/0510vpn2.html?nlBachelor’s program in information assurance, 05/13/04Norwich University is proud to present a completely new Bachelor of Science in Computer Security and Information Assurance (BSIA for short).https://www.nwfusion.com/newsletters/sec/2004/0510sec2.html?nlWhose worms are they? 05/12/04Security issues continue to be top-of-mind for most of us as worms, viruses and other germs plague us almost constantly, as last week’s Sasser worm demonstrated.https://www.nwfusion.com/newsletters/asp/2004/0510out1.html?nl Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Network Security Network Security Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe