If the food industry ran its business like the Internet browsing software industry, then consumers would be hurling lawsuits like bad tomatoes at the companies that give us Internet Explorer, Firefox and Safari. The comparison is existent in a wide-ranging new study showing that approximately 40 per...
It's the bane of anyone who uses the Internet: remembering different user IDs, passwords and registration information for sites you use regularly. Soon, you may not have to. Some of the Internet's biggest players -- Google, Microsoft, Yahoo, IBM and VeriSign -- are working on a new single sign-on th...
IBM posted strong fourth quarter results Monday, beating profits and sales targets as it rode to the rescue of a sagging stock market by providing renewed optimism about technology earnings. Big Blue's profit rose 24 percent to $2.80 per share in the fourth quarter of 2007 while revenue increased 10...
IBM unveiled a slew of new security products and services and said it would continue to invest heavily in security innovations to address customer needs for a more comprehensive approach to information technology risk. On the heels of a security-related buying spree, Big Blue will spend at least $1....
The notorious Norwegian hacker, Jon Lech Johansen -- better known as "DVD Jon" for releasing code that broke DVD copy protection in the late 1990s -- has drawn first blood with the iPhone. Johansen has posted a workaround on the Internet that allows iPhone owners to use their devices in a limited fa...
A new vulnerability in Snort, an open source intrusion-detection system, enables hackers to inject hostile code into exposed systems. Sourcefire, the company behind the Snort package, said hackers could remotely gain control of systems running the software and execute malicious code, as well as gain...
In a bid to further broaden its product offerings beyond core Internet gear, Cisco Systems said Thursday it would buy security software marker IronPort in a deal valued at $830 million. Cisco said the cash-and-stock purchase would enable it to extend its "self-defending network" approach to include ...
A vulnerability in Microsoft's XML HTTP request-handling can be exploited via an ActiveX control through a Web browser -- specifically Internet Explorer -- according to IBM's Internet Security Systems, which claims to have originally identified the flaw. The vulnerability, which is currently being l...
Computer security is a game of leapfrog in which vendors plug certain vulnerabilities and hackers find new ones. This game has lead to a new platform -- the Macintosh -- becoming the apple of some hackers' eyes. "Recently, there has been a lot of interest among the hacking community in attacking the...
As the nature of Internet threats has morphed, IT systems professionals and security providers have adapted their response tactics. Increasingly, organizations are developing comprehensive security strategies and implementing a variety of online and on-demand security applications and services acros...
On all accounts where it's available
Limited to critical accounts like banking and email
Only when enforced by the service provider
Plan to start using soon
Prefer not to use
What is two-factor authentication?
Enter your Username and Password to sign in.