HomeCybersecurity

Cybersecurity

Partners Offer Way to Build Web of Reputations

Two organizations are joining forces to offer a service that enables Internet users to establish identities and reputations, allowing others to decide whether they...

Privacy Pioneer Promises Secure VOIP

LAS VEGAS—Phil Zimmermann, the celebrated cryptographer who created PGP (Pretty Good Privacy) for e-mail encryption, is taking a shot at securing VOIP communications. Zimmermann took...

Price War: iDefense Doubles Bounty for Security Flaws

LAS VEGAS—The decision by 3Com Corp.s TippingPoint division to pay for the rights to information on software vulnerabilities has triggered an immediate response from...

Shadow Walker Pushes Envelope for Stealth Rootkits

LAS VEGAS—Just when anti-virus vendors think they have a bead on the threat from stealth rootkits, along comes word that a pair of researchers...

Gates Touts Advances in Security Tools

REDMOND, Wash.—Security remains one of the biggest concerns for Microsoft over the coming year and beyond. Microsoft chairman and chief software architect Bill Gates and...

Cisco Is Shooting Itself in the Foot

Im not sure who Cisco is trying to impress with its attempt to silence Michael Lynns revelation of holes in its Internetwork Operating System....

Cisco Tries to Quash Vulnerability Talk at Black Hat

A discussion of vulnerability in Cisco Systems Inc.s IOS provoked controversy at this years Black Hat Briefings conference in Las Vegas, after the San...

Cisco Files Suit to Gag Researcher, Security Conference

Cisco Systems and Internet Security Systems have asked a U.S. District Court to issue a restraining order against a former ISS researcher and Black...

Cyber-Crime Treaty Advances, Sparking Debate

Members of the Foreign Relations Committee of the U.S. Senate on Tuesday approved a treaty addressing cyber-crime, prompting criticism from civil liberties groups that...

Security Hole in SAP R/3 Could Expose Sensitive Data

A security flaw has been discovered in the Internet Graphics Server application in SAP R/3 that could allow unauthenticated access to files. Security alerts aggregator...