Security News > 2005

Forwarded from: William Knowles http://www.washingtonpost.com/wp-dyn/articles/A45059-2005Apr11.html By Hanna Rosin Washington Post Staff Writer April 12, 2005 If he is confirmed this month as the...

http://www.computerworld.com/securitytopics/security/holes/story/0,10801,101033,00.html By Jaikumar Vijayan APRIL 12, 2005 COMPUTERWORLD After a rare lull in March, Microsoft Corp. today released...

http://www.computerworld.com/securitytopics/security/cybercrime/story/0,10801,100900,00.html By John Ribeiro APRIL 07, 2005 IDG NEWS SERVICE BANGALORE, India -- Former employees of a call center...

http://www.computerworld.com/securitytopics/security/holes/story/0,10801,100860,00.html by Matthew Broersma APRIL 04, 2005 TECHWORLD.COM Red Hat Inc. is warning enterprise Linux users to update...

http://news.bbc.co.uk/2/hi/asia-pacific/4396831.stm By Jonathan Kent BBC News, Kuala Lumpur 31 March, 2005 Police in Malaysia are hunting for members of a violent gang who chopped off a car...

http://www.theage.com.au/news/Breaking/Hacker-jailed-for-three-years/2005/04/05/1112489456181.html Stockholm April 5, 2005 A Hungarian who cracked the computer system of Swedish mobile...

http://www.chinadaily.com.cn/english/doc/2005-04/03/content_430516.htm Xinhua 2005-04-03 China is expected to pass a new set of rules and regulations to gradually establish an Internet emergency...

http://www.computerworld.com/securitytopics/security/story/0,10801,100646,00.html Opinion by Kim Getgen Reconnex MARCH 30, 2005 COMPUTERWORLD Imagine this scenario: You are a CIO at a publicly...

Forwarded from: Kitetoa at Kitetoa.com (Part I of Kitetoa translation on this ruling is at: http://www.attrition.org/pipermail/isn/2005-March/001312.html - WK] How many bytes do have to copy to...

http://www.computerworld.com/securitytopics/security/story/0,10801,100695,00.html By Paul Roberts MARCH 28, 2005 IDG NEWS SERVICE Leading global telecommunications companies, Internet service...