Security News > 2005

Wireless Web puts personal data at risk
2005-06-22 06:43

Forwarded from: Mark Bernard Dear Associates, If you don't believe that this article speaks about something that could actually happen then why not attempt it in a controlled situation? If you...

Banks to spend more on IT security, survey says
2005-06-21 05:55

http://www.computerworld.com/securitytopics/security/story/0,10801,102642,00.html By Mari-Len De Guzman JUNE 20, 2005 IDG NEWS SERVICE Investment in security has topped the banking sector's IT...

Congress Reacts to Breach Onslaught
2005-06-17 05:46

http://www.internetnews.com/security/article.php/3513466 By Roy Mark June 16, 2005 WASHINGTON -- On a day marked by another major data security breach and more tough talk from Congress, the...

Black Hat Briefings Announcements
2005-06-17 05:45

Forwarded from: Jeff Moss -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello ISN readers, I just wanted to let you know we got some new content on-line as well as a reminder about upcoming...

U.K. government is target in e-mail attacks
2005-06-17 05:45

http://www.computerworld.com/securitytopics/security/story/0,10801,102533,00.html By Scarlet Pruitt JUNE 16, 2005 IDG NEWS SERVICE LONDON -- Critical-infrastructure providers in the U.K. are being...

REVIEW: "CISSP Exam Notes", K. Wan
2005-06-15 06:04

Forwarded from: "Rob, grandpa of Ryan, Trevor, Devon & Hannah" BKCISPEN.RVW 20050330 "CISSP Exam Notes", K. Wan, 2003, 988-97323-1-9, U$24.95 %A K. Wan kplab () pacific net hk %C Hong Kong %D 2003...

Security guidelines for U.S. agencies due in July
2005-06-13 08:03

http://www.computerworld.com/securitytopics/security/story/0,10801,102409,00.html By Jaikumar Vijayan JUNE 10, 2005 COMPUTERWORLD The National Institute of Standards and Technology (NIST) will...

Crying wolf or calling it as it is?
2005-06-13 08:02

http://www.theage.com.au/articles/2005/06/13/1118514962314.html By Sam Varghese June 13, 2005 Tech research firm Gartner's recent advice [1] not to overhype security threats seems to contradict...

Insecurity through obscurity
2005-06-09 05:16

http://www.computerworld.com/securitytopics/security/story/0,,102307,00.html Opinion by Jian Zhen JUNE 08, 2005 COMPUTERWORLD Security through obscurity is probably one of the oldest tricks in the...

Security claims asking for trouble
2005-06-08 09:04

http://www.smh.com.au/news/Next/Security-claims-asking-for-trouble/2005/06/06/1117910220376.html By Patrick Gray June 7, 2005 Next Two words that should never pass the lips of a software vendor...