Security News
http://www.upi.com/Emerging_Threats/2008/06/12/Analysis_Students_labeled_security_threat/UPI-67991213307264/ By SHAUN WATERMAN UPI Homeland and National Security Editor June 12, 2008 WASHINGTON,...
http://www.insurancejournal.com/news/international/2007/05/10/79591.htm May 10, 2007 A new report from Lloyd's and the Economist Intelligence Unit (EIU) has found that global businesses are...
http://www.computerworld.com/securitytopics/security/holes/story/0,10801,110303,00.html By Jaikumar Vijayan APRIL 06, 2006 COMPUTERWORLD A recent case in which an employee at Progressive Casualty...
http://www.computerworld.com/securitytopics/security/story/0,10801,106565,00.html By Brian Eaton NOVEMBER 28, 2005 ITWORLDCANADA TORONTO -- All it takes is one employee to unknowingly compromise a...
http://www.computerworld.com/securitytopics/security/story/0,10801,100637,00.html By Jaikumar Vijayan MARCH 25, 2005 COMPUTERWORLD A threat by Sybase Inc. to sue a U.K.-based security research...
Forwarded from: William Knowles http://www.spacedaily.com/2004/041208055632.1zik2pci.html Dec 08, 2004 - (AFP) TOKYO - Japan will set up a special unit against cyber terrorism and needs to be on...
http://www.computerworld.com/securitytopics/security/story/0,10801,98047,00.html By Jaikumar Vijayan DECEMBER 03, 2004 COMPUTERWORLD Security architectures that are designed solely to react to...
http://cryptome.org/cisco-holes.htm Thanks to A. 14 November 2004 In the SIP images of Cisco 7960/7940 (and perhaps 7970/7980) phones, there is a "telnet" option which can be enabled. In the...
http://www.computerworld.com/securitytopics/security/story/0,,93757,00.html Opinion by Mudge Intrusic Inc. JUNE 10, 2004 Six years ago, I warned the U.S. Senate that it was possible to "take down...
http://www.computerworld.com/securitytopics/security/story/0,10801,93352,00.html News Story by Jaikumar Vijayan MAY 24, 2004 COMPUTERWORLD The theft of proprietary operating system source code...