The Wayback Machine - https://web.archive.org/web/20110920024334/http://www.datamation.com/security/

Security Index

HP Expands Enterprise Security Portfolio
By Sean Michael Kerner | Security Article Published on September 14, 2011
HP's new offering integrates and expands its enterprise security offering. Will it provide HP with a higher profile in the security market?
Hot Trends in Firewalls
By Eric Geier | Security Article Published on September 07, 2011
While we hope they're an impregnable line of defense, firewalls have historically had plenty of limitations. How are next-gen firewalls beefing up security?
Beware the 'Apache Killer' DoS Attack
By Sean Michael Kerner | Security Article Published on August 29, 2011
The Apache Web server is vulnerable to the so-called 'Apache Killer' tool, yet there are defenses.
Does Adobe Help Chrome Security?
By Sean Michael Kerner | Security Article Published on August 25, 2011
Does one of the open source Chrome browser's key differences -- an integrated Adobe flash player -- make it more secure?


60 Open Source Tools for Protecting Your Privacy
By Cynthia Harvey | Security Article Published on August 22, 2011
Open source software for anonymous browsing and email, anti-spyware, data destruction, password management and more.
Security and Privacy Challenges to Boom in 2012
By Stuart J. Johnston | Security Article Published on August 08, 2011
As more and more information is collected in the cloud and by location-based services, privacy challenges become increasingly demanding.
Black Hat: U.S Government Wants Your Security Research
By Sean Michael Kerner | Security Article Published on August 04, 2011
Former Hacker "Mudge" announces new program to fund security research. He claims "hacker" is not a bad word.
Black Hat: Document Exploits Continue to Evolve
By Sean Michael Kerner | Security Article Published on August 03, 2011
Researchers demonstrated that Microsoft Office documents are still exploitable.
Black Hat: Lessons of 9/11
By Sean Michael Kerner | Security Article Published on August 03, 2011
Former CIA operative tells Black Hat that the Stuxnet attack is the Rubicon of our future.
In Defense of Internet Anonymity -- Again
By Bruce Byfield | Security Article Published on August 02, 2011
In contrast with the Linux community's emphasis on user's rights, Facebook, Google+ and many companies work to limit the protection of user anonymity. Who’s right?
Protect Your Servers from Software Attacks
By Paul Rubens | Security Article Published on July 06, 2011
The technologies used by hackers seem to get ever more destructive. Tech expert Paul Rubens overviews how companies are threatened by Permanent Denial of Service (PDoS) attacks.
Google Chrome 12 Updates for 7 Flaws
By Sean Michael Kerner | Security Article Published on June 29, 2011
Google releases security update for its browser.
Security Pro Rafal Los: "There is No 'Secure', Only Manageable Risk"
By Dana Gardner | Security Article Published on June 16, 2011
How do IT organizations become more open while being more protective? Rafal Los, Enterprise Security Evangelist for HP Software, talks about today's challenges.
Top 4 Free Antivirus Software
By Eric Geier | Security Article Published on May 05, 2011
An overview of free antivirus from AVG, Microsoft, Comodo and avast. Which one's the best?
Guard Your PC Against PDF Malware
By Lisa Phifer | Security Article Published on May 04, 2011
PDF-based malware is exceedingly common, yet these tips will help safeguard your computer system.
Cloud Computing Security: Emerging Vendor Round-Up
By Jeff Vance | Security Article Published on May 02, 2011
Cloud computing firms focusing on virtualization security, security for e-commerce transactions, cloud-based data loss protection and more.
Russia Takes Top Hacking Honors, U.S. Lags
By Sean Michael Kerner | Security Article Published on April 27, 2011
Russia produces more hacking attacks than anywhere, while America falls a few spots in this dubious honor roll.
Better Data Security: Five Guidelines
By Datamation.com Staff | Security Article Published on April 21, 2011
Based on an Ernst & Young’s 2010 Global Information Security Survey.
Leaders in Virtualization Security?
By Paul Rubens | Security Article Published on April 20, 2011
An analyst report identifies current leaders in virtualization security, yet notes that these top dogs may lose their perch.
Security Vulnerabilities Rising Rapidly
By Datamation.com Staff | Security Article Published on April 05, 2011
Almost half of all security vulnerabilities did not have a vendor supplied patch by the end of 2010.
How to Safely Use Wi-Fi on Smartphones and Tablets
By Eric Geier | Security Article Published on March 31, 2011
Most public Wi-Fi hotspots are not encrypted, creating a host of potential security problems for smartphone and tablet users.
McAfee Buys Database Security Vendor Sentrigo
By Sean Michael Kerner | Security Article Published on March 24, 2011
The database security vendor's products include a Database Activity Monitoring (DAM) solution that provides virtual patching for database deployments.
Malware Found in Android Apps
By David Needle | Security Article Published on March 03, 2011
Google pulled at least 20 Android apps after the company learned they were infected with malware.
5 Overlooked Threats to Cloud Computing
By Jeff Vance | Security Article Published on February 28, 2011
Virtual machine-launched attacks, multi-tenancy risks and hypervisor vulnerabilities all challenge cloud computing security.
RSA Security Wrap Up
By Lisa Phifer | Security Article Published on February 25, 2011
This year's RSA security conference spotlighted myriad trends in protecting the enterprise.
GOP Lawmakers Move to Strike Down Net Neutrality Regs
By Kenneth Corbin | Security Article Published on February 16, 2011
Resolution of disapproval drops following a contentious oversight hearing on FCC's authority to impose open Internet regulations on broadband access providers.
Google's Chrome 9 Browser Gets Security Fixes
By Sean Michael Kerner | Security Article Published on February 10, 2011
Google rates three of the five security issues as having high impact.
Smartphone Security: 10 Key Points
By Pam Baker | Security Article Published on February 10, 2011
Your smartphone is your greatest security vulnerability, far more than your PC.
Hackers Use Facebook Access as Bait
By Larry Barrett | Security Article Published on February 04, 2011
With more than a half billion users, Facebook is a tempting target for Web miscreants.
BitTorrent Lawsuits: The Red-Light Cameras of the Internet
By Mike Elgan | Security Article Published on February 02, 2011
Computers and software are now handling pre-enforcement monitoring duty, from illegal downloads to traffic violations.
Internet Service Back on in Egypt
By Kenneth Corbin | Security Article Published on February 02, 2011
After a week of darkness for embattled nation's ISPs, Internet monitoring firms find that transmissions started to resume Wednesday morning.
Internet, Telecom Networks Shut Down in Egypt
By Kenneth Corbin | Security Article Published on January 28, 2011
Government authorities order communications providers to unplug infrastructure in an effort to curb further protests, a wholesale blackout that an intelligence firm describes as unprecedented in Internet history.
Leahy Sees Momentum for Patent Reform in Obama Address
By Kenneth Corbin | Security Article Published on January 26, 2011
Senate Judiciary Chairman optimistic that he can press forward controversial effort to overhaul the nation's patent system, pegging the effort to Obama's message of innovation and competitiveness.
House Panel Presses for ISP Data Retention Mandate
By Kenneth Corbin | Security Article Published on January 25, 2011
In the face of persistent privacy concerns, members air bipartisan support for industry-wide standard for ISPs to retain user data to share with law enforcement investigating child pornography and other Internet crimes.
Software Lobby Calls China Piracy Pledge 'Incremental Progress'
By Kenneth Corbin | Security Article Published on January 20, 2011
China has pledged to implement new auditing tools to ensure the government is purchasing legitimate software, a move that met with cautious praise as a good first step from a leading anti-piracy lobby.
EnterpriseDB Releases New Postgres Plus Security Tools
By Sean Michael Kerner | Security Article Published on January 20, 2011
Commercial vendor updates its version of the open source PostgreSQL database and provides new security tools, at a price.
Cisco: Java Attacks on the Rise As Spam Declines
By Sean Michael Kerner | Security Article Published on January 20, 2011
Annual security report from Cisco shows the first ever decline in spam volume, but don’t get too optimistic -- other types of attacks are growing.
Blackburn: FCC Headed for 'Congressional Hurricane'
By Kenneth Corbin | Security Article Published on January 18, 2011
Incensed at the Federal Communications Commission's move to enact net neutrality rules, GOP lawmaker vows to lead a campaign of curbing agency's regulatory overreach.
NY Rep. Asks Treasury to Blacklist Wikileaks' Assange
By Kenneth Corbin | Security Article Published on January 13, 2011
New York Republican Pete King asks Treasury Secretary Timothy Geithner to add Wikileaks founder to list of individuals barred from doing business with U.S. firms.
Disaster Recovery Survey: Pessimism Reigns
By Dave Simpson | Security Article Published on January 13, 2011
A survey of IT professionals about disaster recovery trends revealed some discomforting truths.
America: A Global Leader in Spam
By Larry Barrett | Security Article Published on January 13, 2011
Stats from the fourth quarter of 2010 show that the U.S. hasn't lost its touch, at least not when it comes hacked PCs.
DoJ Leans on Twitter for WikiLeaks Information
By Kenneth Corbin | Security Article Published on January 10, 2011
Probing the mass release of secret government documents, the Justice Department goes to court to wrest information from Twitter about principals in the case, including Julian Assange and the Army private accused of facilitating the leak.
Hackers Target Android Phones
By Larry Barrett | Security Article Published on January 10, 2011
The Android mobile OS is suffering seeing a sharp rise in security attacks, enabled in part by user complacency.
Sourcefire Acquires AV Vendor Immunet
By Sean Michael Kerner | Security Article Published on January 06, 2011
Commercial open source IPS vendor shells out $21 million for cloud based anti-malware technology.
50 iPad Security Apps
By Troy Dreier | Security Article Published on December 30, 2010
iPad security apps for handling passwords, setting alarms, monitoring cameras, theft prevention and more. Many free iPad security apps.
Why Privacy Lawsuits against Apple Matter to Google
By Mike Elgan | Security Article Published on December 29, 2010
The difference in the two companies' business models will determine to what extent they will be affected by looming court decisions.
'Do Not Track' Rules Favored by U.S. Consumers: Gallup
By David Needle | Security Article Published on December 22, 2010
But poll shows many are willing to let certain advertisers of their choosing track them on the Web.
Office Genuine Advantage Bites the Dust
By Stuart J. Johnston | Security Article Published on December 20, 2010
With barely a mention, Microsoft killed off its Office Genuine Advantage program.
White House Pledges Crackdown on Online Counterfeits
By Kenneth Corbin | Security Article Published on December 14, 2010
Senior administration officials talk tough about the illegal trafficking of online goods, zeroing in on health risks such as knock-off pharmaceuticals.
House Panel to Weigh Spy Act Update Amid Wikileaks Scandal
By Kenneth Corbin | Security Article Published on December 13, 2010
Members of the House Judiciary Committee to consider an update of the 1917 Espionage Act to position U.S. authorities to bring Julian Assange to justice.
Internet Explorer 9 to Offer Greater Privacy
By Stuart J. Johnston | Security Article Published on December 09, 2010
The forthcoming browser will allow surfers to prevent advertisers from collecting their profile information.
EU Opens Antitrust Probe Into Google Search
By Kenneth Corbin | Security Article Published on December 01, 2010
European antitrust authorities announce a formal inquiry into allegations from Google's competitors that the search giant used its market clout to undermine competition.
Wikileaks Diplomatic Cable Cache Links China to Google Hack
By Kenneth Corbin | Security Article Published on November 30, 2010
WikiLeaks document stash indicates longstanding cyber espionage campaign orchestrated by Chinese government, prompts harsh White House condemnation of leak.
Senate Panel Passes Controversial Online Piracy Bill
By Kenneth Corbin | Security Article Published on November 18, 2010
Legislation that would crack down on websites engaging in trafficking of counterfeit goods and pirated content heads to the Senate floor amid heated opposition from digital-rights groups.
Selecting the Best Data Wiping Software
By Joseph Moran | Security Article Published on November 18, 2010
When you need to delete sensitive information from a computing device, you need the best possible data wiping software.
IT System Patching: Don't Delay
By Scott Alan Miller | Security Article Published on November 11, 2010
Patches from OS and software vendors need to be applied promptly and regularly to prevent downtime and security risks.
USB Devices Aiding Malware Attacks
By Larry Barrett | Security Article Published on November 10, 2010
Security experts say that USB devices play a role in as many as 1 in 8 malware attacks.
Microsoft Patch Tuesday: Light Release
By Stuart J. Johnston | Security Article Published on November 05, 2010
This release will be a marked contrast to recent Patch Tuesdays, in which Microsoft offered long lists of patches.
Cloud Computing and Privacy Concerns
By Diana Kelley | Security Article Published on November 04, 2010
To best understand the Cloud Computing privacy issue, it is effective to divide the exposure use cases into three categories.
Email Scammers Aim at Military Families
By Larry Barrett | Security Article Published on November 03, 2010
Phishers use unsolicited emails pretending to be from USAA, a financial services firm, to obtain sensitive data.
How Risky is Android Mobile OS Code?
By Sean Michael Kerner | Security Article Published on November 02, 2010
The Android mobile OS has in excess of 300 software flaws, according to a commercial code analysis firm. Yet doesn't every OS have its imperfections?
Google Updates Policy After Camera-Equipped Car Gaff
By Kenneth Corbin | Security Article Published on October 25, 2010
The search giant freely admits that it failed in protecting users' privacy, conceding that it intercepted emails and passwords over unencrypted wi-fi networks.
Is Facebook Security an Oxymoron?
By Mike Elgan | Security Article Published on October 19, 2010
It's time for Facebook and Facebook users to finally get serious about security –- or risk the consequences.
Diluted ACTA IP Accord Offers Consolation to Digital-Rights Groups
By Kenneth Corbin | Security Article Published on October 08, 2010
With the final draft of the Anti-Counterfeiting Trade Agreement now available to the public, interested parties evaluate the impact on Internet service providers.
Microsoft Patch Tuesday: 16 Patches
By Stuart J. Johnston | Security Article Published on October 08, 2010
Within the 16 patches to be released on Tuesday, Microsoft rates four of them as "critical."
White House IP Boss: Digital Piracy Costs U.S. Jobs
By Kenneth Corbin | Security Article Published on October 05, 2010
Linking IP enforcement with the economic recovery, Victoria Espinel has high hopes for the Anti-Counterfeiting Trade Agreement as the final draft nears completion and public release.
EFF Heralds Victory After Senate Shelves IP Bill
By Kenneth Corbin | Security Article Published on October 01, 2010
Leading digital rights group wins a battle in its fight against what it sees as overreaching Internet infringement legislation, though it acknowledges the war is far from over.
Cyberwar Simulation: Is America Ready?
By Kenneth Corbin | Security Article Published on September 30, 2010
Scores of businesses are taking part in Cyber Storm III, a US government simulation intended to explore the ramifications of a major cyberattack.
White House IP Chief Talks Tough on Online Piracy
By Kenneth Corbin | Security Article Published on September 28, 2010
U.S. Intellectual Property Enforcement Coordinator Victoria Espinel touts administration's efforts to crack down on Internet piracy, praises controversial Senate bill to blacklist offending sites.
IBM Buys Compliance Vendor OpenPages
By Larry Barrett | Security Article Published on September 16, 2010
The security firm will added to IBM's business analytics division.
Improving Windows Server Security
By Paul Rubens | Security Article Published on September 15, 2010
Microsoft took down the Waledac spam botnet by gaining control of the domains used by the botnet's herders to issue commands to infected Windows machines.
Enterprise IT Suffering from 'Here You Have' Virus
By Larry Barrett | Security Article Published on September 14, 2010
The email-borne virus has proven to be one of the worst security attacks in recent times.
Hackers Galore: 57,000 New Malware Sites Weekly
By Larry Barrett | Security Article Published on September 13, 2010
No one can accuse hackers of being lazy. A new report indicates that tens of thousands of malware sites spring up each week.
Will Microsoft Acquire Symantec?
By Stuart J. Johnston | Security Article Published on September 10, 2010
Fueled by Intel's planned acquisition of McAfee, some observers speculate that Symantec is on Microsoft's list.
Firefox 4 Set to Improve Security
By Sean Michael Kerner | Security Article Published on September 08, 2010
The latest Firefox 4 Beta milestone includes a new security feature as part of Mozilla's continuing push to raise the browser ante versus rivals like Google and its upcoming Chrome 6 browser.
Android Security: 20 Good Apps
By Jeff Goldman | Security Article Published on September 07, 2010
With the right apps, Android phones support a wide range of mobile security functions, including automated backups and virus scanning.
EPIC Slams Google's Privacy Moves
By David Needle | Security Article Published on September 06, 2010
Google says the more streamlined set of privacy policies will be easier for consumers to grasp, but the head of the Electronic Privacy Information Center wants an FTC investigation.
VMware Rounds Out Cloud Offerings With Security, Analytics Acquisitions
By Thor Olavsrud | Security Article Published on August 31, 2010
The virtualization giant announced today that it will acquire real-time IT analytics firm Integrien and online access management and security firm TriCipher.
Healthcare IT Make Security, EMRs a Priority
By Larry Barrett | Security Article Published on August 25, 2010
A new survey of North American hospital IT admins finds that security remains their top concern but the quest to comply with federal regulations is distracting them from their goals.
The New Browser Wars: Chrome vs. IE vs. Firefox
By Serdar Yegulalp | Security Article Published on August 24, 2010
As cloud computing makes the browser ever more essential, each of the leading browsers has strengths and weaknesses.
Google Pays $10k for Chrome Fixes
By Sean Michael Kerner | Security Article Published on August 23, 2010
Along with fixing 11 Chrome security vulnerabilities, Google paid security researchers for their discoveries.
iPhone Security Apps: Top Options
By Jeff Goldman | Security Article Published on August 19, 2010
iPhone apps for password management, spam prevention and data encryption.
Survey: Staffers Would Purloin Company IP
By Larry Barrett | Security Article Published on August 18, 2010
A survey indicates that about half of employees would purloin enterprise data on their way to a new job.
10 Dangerous Web Malware Threats
By Lisa Phifer | Security Article Published on August 16, 2010
Criminals are using SEO and social engineering to attract more targeted victims to fewer URLs.
Handicapping the Global Cybersecurity War
By Kenneth Corbin | Security Article Published on August 13, 2010
If modern warfare no longer exists without a cyber component, how high are the stakes, and will the United States be ready when the attack comes?
Firefox Plans New Security Features
By Sean Michael Kerner | Security Article Published on August 06, 2010
The popular open source browser will address some security concerns in its forthcoming release, due in August.
Securing Your Virtualized Infrastructure
By Paul Rubens | Security Article Published on August 05, 2010
Virtualization is rapidly gaining adoption, yet corresponding security measure are not as widely used.
IT Vendors Disagree on Paying for Security Holes
By Sean Michael Kerner | Security Article Published on August 03, 2010
Should vendors pay security researchers for vulnerabilities? Microsoft doesn't think so, but Mozilla, HP and Cisco do.
Is Twitter Less Secure Than E-mail?
By Sean Michael Kerner | Security Article Published on July 30, 2010
New research takes a look at the Twitter crime rate, which is on the rise, but might not be as bad as one would think.
White Hat Educates Black Hat Crowd to Not Use Browser Auto-Complete
By Sean Michael Kerner | Security Article Published on July 30, 2010
Whitehat Security researcher exposes a hole in Microsoft's IE that could leave user's private information at risk.
Preview of Black Hat USA 2010
By Sean Michael Kerner | Security Article Published on July 28, 2010
This security conference in Las Vegas will spotlight DNS and SSL technology, among other core concerns.
The Myth of the Secure Apple OS
By Paul Rubens | Security Article Published on July 28, 2010
A research report pokes holes in the much-vaunted sense that Apple's OS is highly secure.
Google Accelerates Chrome Development, Security
By Sean Michael Kerner | Security Article Published on July 23, 2010
Making a faster browser isn't good enough for Google, which also want to release more often and fund more security research, too.
Firefox Gets 14 New Patches
By Sean Michael Kerner | Security Article Published on July 22, 2010
Of the 14 Firefox patches, eight address security vulnerabilities that Mozilla calls critical.
Firefox Browser Secured by Dell?
By Sean Michael Kerner | Security Article Published on July 21, 2010
Dell has launched a free, secure browser based on wrapping Mozilla's Firefox in a virtualization shell.
Windows 7 Security: 10 Positives
By Lisa Phifer | Security Article Published on July 20, 2010
For users and businesses considering the move to Windows 7, there are a number of security features that prove attractive.
Improving Security Through Regulatory Compliance
By Sonny Discini | Security Article Published on July 16, 2010
The expense of regulatory compliance is burdensome to businesses, yet it does offer some advantages.
Does IT Need Independent Backup for Google Apps?
By David Needle | Security Article Published on July 15, 2010
New Backify service gives IT, particularly in small to midsize businesses, an option for making sure cloud-based data in Google Apps and social media services are not lost.
Enterprise iPhone Security: Essential Apps
By Jeff Goldman | Security Article Published on July 12, 2010
No, the enterprise has not welcomed the iPhone, yet it has become a dominant workplace handheld nonetheless. How can you make it secure enough for the workplace?
U.S. Launches Cyber Attack Detection Program
By - Reuters | Security Article Published on July 08, 2010
Nicknamed "Perfect Citizen," the program will attempt to uncover cyber assaults on private companies and government agencies.

IT Offers