While enterprises may be on top of their security practices for the most part, data leakage as a result of end user misuse and abuse is something that might very well be flying under the radar. According to a newly released global study by Cisco, "The Challenge of Data Leakage for Business and Emplo...
Computer and Internet security experts were closely watching the development of a mysterious outbreak that appears to have used a new tactic against an old vulnerability to infect thousands, possibly millions, of Web servers, Internet sites and Microsoft's Internet Explorer browser users. The widesp...
Through the years, some malicious computer programs have come to be known as viruses. Dr. Fred Cohen, a principal analyst with market research firm Burton Group, coined the term when he was working as a graduate student at the University of Southern California in the early 1980s. "There was a resemb...
Computer attackers are among those discussing and dissecting exploit code for a recently disclosed, serious security gap in all newer versions of Microsoft Windows operating systems, following a pattern now familiar to victims of the SQL Slammer, Blaster, Nimda or Code Red viruses. And while past ex...
A major security vulnerability in Microsoft's Windows operating system has security experts concerned about widespread attacks even though Microsoft has issued a patch for the problem -- this time a security vulnerability in the widely used Abstract Syntax Notation (ASN.1) protocol. Microsoft, which...
Despite red-alert headlines about hackers, worms and viruses, and despite the threat of identity theft and misappropriation of personal data, many home computer users have yet to invest in the first line of defense against external attacks: a firewall. "Currently, only about 55 percent of antivirus ...
Reinforcing the message that can be easily inferred from recent virus and worm outbreaks, security giant Symantec has reported that attacks on company computers -- up 19 percent to an average of 38 attacks per business per week -- increasingly are using a potent combination of disclosed security vul...
Despite the recent success of computer worms, such as Blaster, that have pounced on newly discovered vulnerabilities, a new threat that looks remarkably like a legitimate security e-mail from Microsoft is using a two-year-old vulnerability to infect thousands of computers. Known as "Swen" or "Gibe,"...
A widely anticipated threat materialized this week as a worm that exploits a Microsoft Windows flaw began infecting some of the millions of vulnerable machines around the world. Experts said the relatively simple "Blaster" worm -- also referred to as "LoveSan" -- was spreading at a steady pace Monda...
Nine days after Microsoft warned of a widespread Windows flaw, a program to exploit it has been published online by a group based in China, representing one of the shortest times between warning and worm. The exploit code, published by a group known as Xfocus, is not technically a worm itself, but i...
Accessibility of service
Convenience in any situation
Cost-effectiveness
Eco-friendliness
No need for parking
Safe ride when having too much fun
Enter your Username and Password to sign in.