Security News

Cyber Threats 101
2009-02-17 10:27

http://www.washingtonpost.com/wp-dyn/content/article/2009/02/15/AR2009021501399.html By Kim Hart The Washington Post February 16, 2009 An Army lieutenant may be an expert at securing borders and...

Analysis: Students labeled security threat
2008-06-16 09:05

http://www.upi.com/Emerging_Threats/2008/06/12/Analysis_Students_labeled_security_threat/UPI-67991213307264/ By SHAUN WATERMAN UPI Homeland and National Security Editor June 12, 2008 WASHINGTON,...

Lloyd's Report Warns of Threats from 'Political Violence'
2007-05-11 05:36

http://www.insurancejournal.com/news/international/2007/05/10/79591.htm May 10, 2007 A new report from Lloyd's and the Economist Intelligence Unit (EIU) has found that global businesses are...

Data breach at Progressive highlights insider threat
2006-04-07 05:33

http://www.computerworld.com/securitytopics/security/holes/story/0,10801,110303,00.html By Jaikumar Vijayan APRIL 06, 2006 COMPUTERWORLD A recent case in which an employee at Progressive Casualty...

Uninformed staff pose security threat: Expert
2005-11-29 06:46

http://www.computerworld.com/securitytopics/security/story/0,10801,106565,00.html By Brian Eaton NOVEMBER 28, 2005 ITWORLDCANADA TORONTO -- All it takes is one employee to unknowingly compromise a...

Legal threat stops flaw info release
2005-03-28 09:59

http://www.computerworld.com/securitytopics/security/story/0,10801,100637,00.html By Jaikumar Vijayan MARCH 25, 2005 COMPUTERWORLD A threat by Sybase Inc. to sue a U.K.-based security research...

Japan to step up defenses against Islamic, NKorean,	computer threats
2004-12-10 10:39

Forwarded from: William Knowles http://www.spacedaily.com/2004/041208055632.1zik2pci.html Dec 08, 2004 - (AFP) TOKYO - Japan will set up a special unit against cyber terrorism and needs to be on...

Q&A: ISS exec on security threat prevention
2004-12-06 09:27

http://www.computerworld.com/securitytopics/security/story/0,10801,98047,00.html By Jaikumar Vijayan DECEMBER 03, 2004 COMPUTERWORLD Security architectures that are designed solely to react to...

Intercept Threats of Cisco IP Phones
2004-11-16 13:35

http://cryptome.org/cisco-holes.htm Thanks to A. 14 November 2004 In the SIP images of Cisco 7960/7940 (and perhaps 7970/7980) phones, there is a "telnet" option which can be enabled. In the...

Inside the insider threat
2004-06-11 10:20

http://www.computerworld.com/securitytopics/security/story/0,,93757,00.html Opinion by Mudge Intrusic Inc. JUNE 10, 2004 Six years ago, I warned the U.S. Senate that it was possible to "take down...