Search: Home Bugtraq Vulnerabilities Mailing Lists Security Jobs Tools


News (Page 1 of 218)   1 2 3 4 5 6 7 8 9 10 11  Next >
Virus names likely a lost cause
The Common Malware Enumeration Project clears up confusion for responders, but racing to name the latest virus in the media will continue to be the norm.
By: Robert Lemos, SecurityFocus 2006-03-09
http://www.securityfocus.com/news/11380

Antivirus groups fight over Crossover sharing
A young antivirus group's attempts to leverage a rare exclusive virus discovery into greater membership has earned it criticism from the old guard of antivirus companies.
By: Robert Lemos, SecurityFocus 2006-03-03
http://www.securityfocus.com/news/11379

Triple threat to Mac OS X largely academic
Two worms and an exploit for Apple's operating system hardly threaten consumers' computers, but should act as a wake-up call for Mac users.
By: Robert Lemos, SecurityFocus 2006-02-24
http://www.securityfocus.com/news/11378

Private identities become a corporate focus
Technology companies at the RSA Security Conference expound on the privacy benefits of online services that authenticate users based on the least amount of information possible.
By: Robert Lemos, SecurityFocus 2006-02-20
http://www.securityfocus.com/news/11377

Startup tries to spin a safer Web
Armed with client-side honeypots and a low-cost team in India, a group of MIT graduates aims to create a system to warn Web surfers about the seedier sites, and outright malicious servers, on the Internet.
By: Robert Lemos, SecurityFocus 2006-02-12
http://www.securityfocus.com/news/11376

Apple's in the eye of flaw finders
With the move to Intel processors and a larger share of the market, Apple's Mac OS X could find itself a more popular target of attack, security professionals say.
By: Robert Lemos, SecurityFocus 2006-02-07
http://www.securityfocus.com/news/11375

Blackmal virus set to delete files
Security experts urge companies to clean their networks of a malicious mass-mailing computer virus, before compromised systems reach the first trigger date and start deleting eleven types of files.
By: Robert Lemos, SecurityFocus 2006-02-01
http://www.securityfocus.com/news/11374

Good worms back on the agenda
A researcher argues that the spreading capabilities of worms could better perform penetration testing inside networks, turning vulnerable systems into distributed scanners.
By: Robert Lemos, SecurityFocus 2006-01-27
http://www.securityfocus.com/news/11373

Researchers: Rootkits headed for BIOS
UPDATE: Insider attacks and industrial espionage could become more stealthy by hiding code in the core system functions stored on the motherboard, researchers say.
By: Robert Lemos, SecurityFocus 2006-01-26
http://www.securityfocus.com/news/11372

Zero-day details underscore criticism of Oracle
A security researcher releases detailed information about a critical vulnerability in Oracle's application and Web servers, taking the company to task for not fixing the issues quickly.
By: Robert Lemos, SecurityFocus 2006-01-25
http://www.securityfocus.com/news/11371

News (Page 1 of 218)   1 2 3 4 5 6 7 8 9 10 11  Next >







 

Privacy Statement
Copyright 2005, SecurityFocus