The Wayback Machine - https://web.archive.org/web/20071116000540/http://www.internet.com:80/security/

Events | Webcasts | Jobs | Video | Solutions | eBooks | Partners | Shop

  • Oct 31 (2 pm EDT, 11 am PDT)In the world of ITSM, security plays a key role and must be properly factored into the design and delivery of services.
  • Watch this on-demand webcast sponsored by Symantec.
New on Internet.com/security
Last modified: November 15, 2007, 04:00 PM EST.
Feature PhotoVirus Infections Reflect Sloppy Manufacturing
Maxtor drive infection the latest example of what happens when manufacturing systems are connected to that virus haven known as the Internet.

More Featured »

Spotlight
Sponsored by:
Regiseter for this whitepaper
Webcast: The Role of Security in IT Service Management
Scarcely a day goes by without some news story regarding a security breach. In the world of ITSM, security plays a key role and must be properly factored into the design and delivery of services. Sign up for this webcast to learn more.

More Webcasts...

Threats & Alerts View Rss Feed
Rbot-GVC a Windows Worm
W32/Rbot-GVC is a worm for the Windows platform.
  • Troj/Wixud-B is a Trojan for the Windows platform.
  • W32/Vora.worm!p2p is a worm that when run, shows a small GUI message box on the screen.
  • W32/Sdbot-DIT is a worm with IRC backdoor functionality for the Windows platform.
  • W32/Hakaglan.worm is a worm written in AutoIT that spreads via Yahoo Messenger, removable drives and network shares.
  • W32.Motsys is a worm that spreads by copying itself to removable drives.

Risk Management View Rss Feed
Google Postini Gains E-Mail Content Compliance Tools
The on demand e-mail security and compliance service is available to Google Apps Premier users and eventually will extend to blogs, wikis and IM.
  • Microsoft offers a tool to automate security settings in Office to protect against malicious files.
  • Symantec's latest Norton Internet Security 2008 release is equipped to protect your personal data.
  • Big Blue says it's baking security awareness into every facet of its business -- and if it's lucky, perhaps yours soon, too.
  • The company integrates its antivirus engine with a firewall to watch all traffic flowing in and out of the computer.
  • One message at Interop this week? When it comes to data security, it's better to first figure out what to secure.

Security Best Practices View Rss Feed
ESET Updates Antivirus For Network Scanning
The company integrates its antivirus engine with a firewall to watch all traffic flowing in and out of the computer.
  • Safeguarding data doesn't need to be elaborate or expensive. Here are five tips to help you improve your cyber security.
  • New managed service from Renaissance uses Trapeze and AirDefense to help lock down retail networks.
  • New versions for 2008 add more intelligent filtering and greatly improve performance.
  • The biggest threat to your data may not be hackers, but disgruntled, duplicitous, or just plain clueless insiders. Fortunately, there are tools at your disposal.
  • Hackers have a lot of different tools at their disposal, but the power of the Jedi wave may be all they really need.

Today on internet.com/security

Website, Lawsuits Take Aim at Pirates
Microsoft opens a new site to educate users on how to spot illicit software, and also sues 20 alleged vendors for selling pirated copies of its software.

Salesforce.com Scrambles To Halt Phishing Attacks
Another example of why humans—not technology—are the weakest link in security.

Fortress Mac is -- Whoops -- There it Goes...
The biggest threat to Mac security is user stupidity, and not even Apple can do much about that.

Symantec Snaps Up Vontu
The security software vendor acquires data protection software firm for $350 million.

Lessons Learned: People in Glass Houses Shouldn’t Brick Phones
Let’s hope other mobile vendors paid close attention to Apple’s big blunder – but don’t bet on it.

The "IT" in Security Guard
IT staffers are donning the uniform (albeit virtually) and it's about time that businesses took notice.

Does Oracle's Database Need More Security?
At least two third-party security vendors think so.

Symantec's Latest: Customized Threat Protection
Service is designed to offer security analysis and remediation for companies facing targeted attacks.

CSI Survey 2007: Lay of the Land
This year's security survey yields insight on the corporate landscape in terms of privacy and spending. Plus, it reveals at least one IT function that is bucking the outsourcing trend.

Promisec InnerSpace: Endpoint Security over Distributed Networks
Endpoint security management and policy enforcement go global with new offering from Promisec.

Security Topics
Security Advisors
Advice and opinion from security experts on threats and trends.

Anti-Spam Products
Regular updates on the latest in anti-spam software.

Information Security Trends
Reports on the latests trends affecting the security within corporate computing environments.

Intrusion/Detection Products
Briefings on the latest products for monitoring network intruders.

Security News
eSecurityPlanet reports daily on news affecting security with corporate computing environments.

Glossary
A comprehensive dictionary of computer security terms, kept up to date with frequent updates.

Security Discussion
An interactive community discussion forum for sharing insight into threats and solutions.

Devx


JupiterOnlineMedia

internet.comearthweb.comDevx.commediabistro.comGraphics.com

Search:

Jupitermedia Corporation has two divisions: Jupiterimages and JupiterOnlineMedia

Jupitermedia Corporate Info