Security News & Reviews - Page 1433

More Security News

Privacy.gov

|
You are sitting on a cold chair in a bright room, hands cradling your forehead, trying to concentrate on the difference between the present indicative active and future indicative active tenses of the third conjugation for Latin verbs.

A Way to Ease Security Woes

|
We all have come to take our simple household appliances for granted. Pick up the phone, make a call; put a slice of bread in the toaster, get toast; turn on the TV, veg out.

NSA to Fund Secure Linux

|
Just a few months after releasing code for its internal research efforts to build a more secure Linux, the National Security Agency has taken the next step to make sure the project gets completed.

Top Cop Quits

|
Privacy advocates rejoice

Analysts Downplay U.S.-China E-War

|
The "hacker war" between the U.S. and China may be nothing more than a label slapped on ongoing behavior, security experts say.

Worms Come Under Attack

|
Anti-virus vendors work on technologies that will keep outbreaks such as the ILoveYou virus at bay.

Paranoid for a Reason

|
Renew your driver's license early if you live in California; you may need the unexpired one for a trip to the nearest Social Security office.

Beware of Scare Tactics in Security

|
The computer security industry got its groove back at the RSA Security Conference by invoking FUD-fear, uncertainty and doubt-to wrest the attention and dollars of corporate IT managers.

Choosing a Security Consultant? Beware

|
In last month's column, I discussed some of the factors to consider in deciding whether to have a penetration test done for your organization.

eFiles: April 30, 2001

|
The three A's - authentication, authorization and administration - represent the largest and fastest-growing segment of the Internet security software market, according to a recent report from International Data Corp., of Framingham, Mass.

Latest PitBull Attack Holds Lessons for IT

|
Earlier this year, during eWeek's OpenHack III, we stated that the most promising method for beating Argus Systems Group Inc.'s PitBull was a direct attack on the operating system kernel.

Is Privacy Too Expensive?

|
The online privacy debate has dwelled on civil liberties, Capitol Hill strategies and alarming anecdotes about privacy breaches, but until recently it has largely ignored an important piece of the puzzle - the cost of putting privacy safeguards in pl

Enterprise Tech Videos