Online bandits promise more of the same in 2008

Last year we saw hackers exploit trusted brands, and we can expect to see more of the same this year - especially with the popularity (and relative insecurity) of social networking sites. The

Published on: January 3rd, 2008 Vawn Himmelsbach

Monster.com admits to previous identity attacks

The theft of personal information from some 1.3 million users of the Monster.com job search service first revealed two weeks ago was not a one-time attack, the company's CEO said Wednesday."The Company has

Published on: August 31st, 2007 Gregg Keizer

Tool tests for online gullibility

Do your company's employees seem like easy dupes for e-mail phishing attacks and other scams? A vulnerability-assessment tool from Core Security Technologies lets you set up automated tests to find out. Impact 7.0

Published on: August 1st, 2007 Ellen Messmer

The community should unite for security

There are a number of key trends right now leading to optimization of technology, such as encryption in Windows Vista. However, optimization of people and process is still needed, as is a common

Published on: March 26th, 2007 Stephen Ibaraki

Phishing lines crossed in the electronic ocean

Phishing used to be mainly a threat to the technically unsophisticated consumer. Phishers broadcast messages purporting to be from major banks and online businesses such as eBay and Paypal, giving the recipients some

Published on: March 7th, 2006 Grant Buckler