Security News
![Hackers reopen stolen code store with Cisco wares](/static/build/img/news/alt/cyberattack-stats-small.jpg)
http://www.computerworld.com/securitytopics/security/story/0,10801,97194,00.html By Paul Roberts NOVEMBER 03, 2004 IDG NEWS SERVICE An anonymous group of malicious hackers reopened an online store...
![Study: Lax laptop policies create security concerns](/static/build/img/news/alt/Data-Cybersecurity-Predictions-small.jpg)
http://www.computerworld.com/securitytopics/security/story/0,10801,97094,00.html By John E. Dunn NOVEMBER 01, 2004 TECHWORLD.COM Company laptops are routinely used to download music and video,...
![Secret Service busts online organized crime ring](/static/build/img/news/alt/cyberattack-costs-scaled-small.jpg)
http://www.computerworld.com/securitytopics/security/story/0,10801,97017,00.html By Dan Verton OCTOBER 28, 2004 COMPUTERWORLD In what it called an "Information Age undercover investigation," the...
![Professor 'horrified' by poor security](/static/build/img/news/alt/cybercrime-statistics-small.jpg)
Forwarded from: William Knowles http://www.theage.com.au/articles/2004/10/25/1098667678959.html By Edmund Tadros October 26, 2004 Next Western computer systems are becoming more vulnerable to...
![IBM offers companies monthly security report](/static/build/img/news/alt/cybersecurity-attacker-small.jpg)
http://www.computerworld.com/securitytopics/security/story/0,10801,96925,00.html By Scarlet Pruitt OCTOBER 25, 2004 IDG NEWS SERVICE IBM today introduced a security service that offers a concise,...
![Hackers post achievements online](/static/build/img/news/alt/cyber-threat-stats-small.jpg)
http://star-techcentral.com/tech/story.asp?file=/2004/10/26/itfeature/9173356&sec=itfeature BY M. MADHAVAN October 26, 2004 Malaysia was the centre of 'hacker activities' on Oct 6 and 7 when...
![Report: Corporate security undermined by lack of cooperation](/static/build/img/news/alt/managed-security-small.jpg)
http://www.computerworld.com/securitytopics/security/story/0,10801,96876,00.html By Jaikumar Vijayan OCTOBER 22, 2004 COMPUTERWORLD A lack of information sharing and cooperation between IT...
![Five mistakes of log analysis](/static/build/img/news/alt/cyber-threat-stats-small.jpg)
http://www.computerworld.com/securitytopics/security/story/0,10801,96587,00.html Opinion by Anton Chuvakin netForensics Inc. OCTOBER 21, 2004 COMPUTERWORLD As the IT market grows, organizations...
![What your CEO thinks about security (and how to change it)](/static/build/img/news/alt/cybercrime-statistics-small.jpg)
http://www.computerworld.com/securitytopics/security/story/0,10801,96803,00.html Advice by Larry Ponemon OCTOBER 20, 2004 COMPUTERWORLD Up to now, enterprises' security budgets have been so lean...
![2-Fingerprint Border ID System Called Inadequate](/static/build/img/news/alt/web-statistics-2-small.jpg)
http://www.washingtonpost.com/wp-dyn/articles/A43276-2004Oct18.html By Robert O'Harrow and Jr. Scott Higham Washington Post Staff Writers October 19, 2004 Terrorists who alter their fingerprints...