The Wayback Machine - https://web.archive.org/web/20071012221723/http://www.esecurityplanet.com:80/

eSecurity Planet Earthweb
Images Events Jobs Premium Services Media Kit Network Map E-mail Offers Vendor Solutions Webcasts
   eSecurity subjects:
   E-Security Planet Webcasts:
  Keeping Your Data Secure from the Outside In

  Beyond Basic Data Security

  more Webcasts...


Search EarthWeb Network

internet.commerce
Be a Commerce Partner
Laptop Batteries
Corporate Awards
Shop
KVM Switches
Business Lists
Online Universities
Baby Photo Contest
Memory Upgrades
Imprinted Promotions
Plasma Televisions
Register Domain Name
Graphics Cards
Custom Products
Prepaid Phone Card

Featured on the Forefront: Secure Your IT Portal
Forefront Edge Security and Access Demonstration Toolkit
The Forefront edge security and access products, Internet Security and Acceleration (ISA) Server 2006 and Intelligent Application Gateway (IAG) 2007, provide enhanced network edge protection and application-centric, policy-based access to the corporate IT infrastructure across secure remote access, with branch office security, and Internet access protection. »

Featured on the ProCurve Resource Center
Whitepaper: Network Immunity Solution
More networks are being attacked and threatened, in more devious and creative ways, than ever before. Incidents range from viruses and worms to Trojan horses and internal sabotage. Find out how to defend yourself with a simple, efficient, and affordable architecture that provides broad coverage of internal threat protection for wired and wireless networks.»

Featured in the eBook Library for Technology Professionals
eBook: Guide to Managing an IT Staff
Why is managing technical people difficult? Some would say techies are socially inept and simply can't communicate well. While that may be true in some cases, saying so doesn't help managers deal with techies any better: It just defers the problem. Download this eBook for advice on how to bridge the communications gap. Download this eBook now.

Threat AlertsThreat Alerts
Latest Malware
10/12: Allaple-F Worm Targets Windows
10/12: Mdropper.WN Trojan Arrives as .DOC File in Email
10/12: Vetor-E an Executable File Virus
10/12: Agent-GDZ a Password-Stealing Trojan
10/12: Tesla-A Virus Targets Windows
10/12; LCJump-B Worm Copies Itself to Mapped Drives
10/11: Niuniu Worm Spreads Via Network Shares, Infecting HTML Files
Storm Worm Rewrote the Botnet and Spam Game
10/10: Pushdo.AD Trojan Arrives Via Spammed Hentai Emails
10/10: Trojan.Fakeavalert Displays False Antivirus Alerts, Lowers Settings

Receive Threat Alerts via XML/RSS feeds

See More of the Latest Alerts Here

Most Dangerous Malware


XML/RSS feeds

EarthWeb IT Management news and headlines
eSecurity Planet headlines
See more EarthWeb Network RSS feeds
Security Spotlight
A Guide to Finding, Removing and Preventing Online Pests -- Online pests can range from the annoying to the downright dangerous. This Intranet Journal guide takes a step-by-step approach to diagnosing, removing and preventing spyware infestations.

[ more ]
Opinion Articles
Mozilla Thunderbird vs. Microsoft Outlook
Microsoft's New Patent: The Dark Side of SaaS
Mozilla Firefox vs. Internet Explorer: Which is Safer?
The Las Vegas Counterfeiting Story: Is Your Privacy Worth More Than a Poker Chip?
The iPhone: Don't Trust the Client
Spam: You've Come a Long Way, Baby
eSecurity Glossary
biometrics
encryption
keylogger
malware
phishing
RFID
security
spyware
virus
worm
FREE Tech Newsletters

On-demand Webcast: Keep Your Data Secure From the Outside In. Learn how to tap SSL to secure your mail traffic and strengthen your VPNs.

Microsoft Issues IE Security Alert
By Andy Patrizio - Published October 12, 2007
Just days after Patch Tuesday it finds a significant threat in Internet Explorer 7. [more Online Threats & Alerts]

Storm Worm Rewrote the Botnet and Spam Game
By Pedro Hernandez - Published October 9, 2007
Nasty malware in its own right, Storm also provided a cunning spam platform, and perhaps more troubling, a template for others to follow. [more Online Threats & Alerts]

Fuzzing at 18: Still Crude, Still Effective
By Sean Michael Kerner - Published October 6, 2007
Throw garbage at an application and what happens? In plenty of cases it'll crash. [more Information Security Trends]


Marin County Ignored Security Warnings
By Larry Barrett - Published October 6, 2007
Security experts warned officials its Web site was hacked weeks before the feds shut down the entire ca.gov sub-domain. [more esecurityplanet]

Apple Aims to Patch Persistent QuickTime Hole
By Sean Michael Kerner - Published October 5, 2007
Bug identified over a year ago gets quashed in security update. [more Vulnerability & Virus Patches]

Sun Fixes Severe Java Vulnerabilities
By Andy Patrizio - Published October 5, 2007
Holes in Java code could let malicious apps access your file system or your network without your knowledge. [more Online Threats & Alerts]

Rise of the Weaponized Rootkit
By Sonny Discini - Published October 4, 2007
And you thought stealth was the only trick up a rootkit’s sleeve. [more Information Security Trends]

Symantec Adds Bot Hunting to Managed Services
By Andy Patrizio - Published October 4, 2007
By using a traceback method, Symantec can look for hidden botnets within a corporate network. [more Prevention & Risk Management]

Report: Consumers Not as Safe Online As They Think
By Andy Patrizio - Published October 3, 2007
McAfee survey finds many computers are far less secure than their owners believe. [more Information Security Trends]

Google Bolsters E-Mail Security In Apps
By David Needle - Published October 3, 2007
Integration of security features from Postini designed to make Google Apps more appealing to large customers. [more Prevention & Risk Management]

Mozilla Thunderbird vs. Microsoft Outlook
By Kenneth van Wyk - Kenneth van Wyk Published October 2, 2007
A security expert examines the relative security of the two programs on a point-by-point basis. [more esecurityplanet]

HP Settles Patent Dispute With Cenzic
By Sean Michael Kerner - Published October 2, 2007
Legal challenges come to an end as security vendors agree to get along. [more Information Security Trends]

Thanks, Russia: Antivirus Software Market Remains Healthy
By Andy Patrizio - Published October 1, 2007
Amid the myriad antivirus companies, two surprises emerge from under the shadows of Symantec and McAfee. [more Prevention & Risk Management]

Rugged Security: MESHnet Firewall
By Lyne Bourque - Published September 29, 2007
Two firms team for a portable, military-grade hardware firewall that will take whatever hackers -- or Mother Earth, for that matter -- can dish out. Plus, it looks the part. [more Prevention & Risk Management]

AOL Claims AIM is Safe
By Sean Michael Kerner - Published September 28, 2007
After a pair of security research groups level allegations of insecurity against AIM, AOL moves to fix its back end. [more Prevention & Risk Management]

Those Nifty Widgets Can Pack A Rude Surprise
By Andy Patrizio - Published September 28, 2007
Malware finds a new target in desktop widgets that look simple and harmless but can carry a malicious payload. [more Information Security Trends]

Networking Notes: Playing the Password Game
By Michael Hall - Published September 27, 2007
Some security experts say we need to do the impossible: Create and memorize a unique password for each and every service we use. But there are options — this nifty Web site or just write them down. [more Security Best Practices]

Hackers Scoff At iPhone Warning
By Larry Barrett - Published September 27, 2007
Despite Apple's dire warning of imminent "brickdom" and worthless warranties, hackers and customers who managed to unlock their iPhones say they have the law and ingenuity on their side. [more Information Security Trends]

Receive news via our XML/RSS feed


See more EarthWeb Network feeds

Whitepaper: Linux vs. Microsoft--Making the Right Choice for Your Client-Server Infrastructure.
PDF: Preparing for an IT Audit. Greatly Enhance Your IT Audits by Understanding What is Needed in Advance.
Trial Software: Forefront Edge Security & Access Demo Toolkit. Get enhanced network edge protection & more.
On-demand Webcast: Beyond Basic Data Security
Whitepaper: Learn How CIOs Can Drive Growth, Flexibility & Innovation in a Flex-Pon-Sive Company. Do you simply respond to change? Or drive it?


IT MANAGEMENT NETWORK NEWS
Availability of Skills Tops List of CIO Concerns
Microsoft Issues IE Security Alert
Neverfail Lives Up to Its Name
IBM Aims to Burst Microsoft's Office Communications Bubble
SAP, Business Objects in $6.7B Merger
SAP Readies New Developer Perks
What Does the RIAA File-Sharing Verdict Imply for DRM?
Intertrust Releases Royalty Scheme for Mobile DRM
10/12: Allaple-F Worm Targets Windows
10/12: Mdropper.WN Trojan Arrives as .DOC File in Email
Straight from the Top
A CMDB Can Be Done But Why Would You Want To
Click here to see our latest articles
Report: TJX Security Was 'Inadequate'
IronPort OS Gets Encryption Update
SDSC Does Supercomputing on Demand
Layered Technologies, NetApp Pair Storage, Grids
Availability of Skills Tops List of CIO Concerns
Career Backup Plans – Part One
Service Catalogs Hit the Sweet Spot
When the Board Comes Calling

Solutions


JupiterOnlineMedia

internet.comearthweb.comDevx.commediabistro.comGraphics.com

Search:

Jupitermedia Corporation has two divisions: Jupiterimages and JupiterOnlineMedia

Jupitermedia Corporate Info