Virus Hoaxes and the Real Dangers They Pose
Virus Hoaxes are a fairly common phenomenon. Most email users have received messages warning of malicious viruses threatening to wreak havoc on their computers. Many of these hoaxes are harmless fun. Unfortunately, many pose real dangers. This article will offer a brief overview of virus hoaxes, how users can spot them, and how they can protect themselves against them. 2003-03-25 http://www.securityfocus.com/infocus/1678 IP Spoofing: An Introduction IP spoofing allows an attacker to gain unauthorized access to a computer or a network by making it appear that a malicious message has come from a trusted machine by “spoofing” the IP address of that machine. In this article, we will examine the concepts of IP spoofing: why it is possible, how it works, what it is used for and how to defend against it. 2003-03-11 http://www.securityfocus.com/infocus/1674 U.S. Information Security Law, Part 1 This is the first article in a four-part series exploring the law of information security in the United States. This article addresses the legal framework for protection of information systems and the role of information security professionals in the creation of trade secret interests, one type of intellectual property. 2003-02-25 http://www.securityfocus.com/infocus/1669 Instant Insecurity: Security Issues of Instant Messaging Instant messaging services are becoming an increasingly popular form of communication, both in the personal and the professional spheres. This paper will describe instant messaging and offer a brief overview of some of the security threats associated with the service. 2003-01-13 http://www.securityfocus.com/infocus/1657 Securing Outlook, Part Two: Many Choices to Make This is the second of two articles focusing on ways to secure one of the world's most popular e-mail clients, Microsoft's Outlook. The first article offered a brief overview of Outlook, as well as some security issues. It also discussed configuring Outlook for optimal security. This article will look at some more things that Outlook users can do to secure their e-mail. 2002-12-23 http://www.securityfocus.com/infocus/1652 Securing Outlook, Part One: Initial Configuration Millions of Outlook users around the world, in homes, organizations, and businesses, have had to face the insecurities inherent in their email program, sometimes painfully. This article is the first of a two-part article that will examine ways that Outlook users can secure their email client. 2002-12-10 http://www.securityfocus.com/infocus/1648 Barbarians at the Gate: An Introduction to Distributed Denial of Service Attacks DDoS attacks first made headlines in February 2000. Now, almost three years later, can it be that we're still vulnerable? Unfortunately the answer is yes. This article will explain the concept of DDoS attacks, how they work, how to react if you become a target, and how the security community can work together to prevent them. 2002-12-03 http://www.securityfocus.com/infocus/1647 Security Concerns in Licensing Agreements, Part Two: Negotiating Security Provisions This is the second of two articles that will discuss some security-related aspects of software licenses and agreements for Web-based information services. Part One focused on shrinkwrap and clickwrap agreements. This article will emphasize individually negotiated agreements, with particular regard to the opportunities for information security professionals to work with legal counsel in the negotiation and preparation of such agreements. 2002-10-21 http://www.securityfocus.com/infocus/1636 Assessing Internet Security Risk, Part 5: Custom Web Applications Continued This article is the fifth and final in a series that is designed to help readers to assess the risk that their Internet-connected systems are exposed to. The previous installment discussed a relatively unexplored aspect of Internet security, custom Web applications. This article will conclude the discussion of Web applications. 2002-10-08 http://www.securityfocus.com/infocus/1632 Assessing Internet Security Risk, Part 4: Custom Web Applications This article is the fourth in a series that is designed to help readers to assess the risk that their Internet-connected systems are exposed to. This installment will discuss a relatively unexplored aspect of Internet security, custom Web applications. 2002-10-03 http://www.securityfocus.com/infocus/1631 |
|
Privacy Statement |