Site Map - IT Security

Digging Up the Dirt on Pharming

- While phishing scams are still going strong, scammers are moving toward a more high-tech method of online fraud known as pharming.

With IT, you Get Escrow

- When companies live by their code—their critical software programs—they’d better know how to protect it.


- A bill (H.R. 744) that would prohibit the use of spyware has been approved by the House and is now pending in the Senate Judiciary Committee.

Quick Bytes: Kill the zombies

- The Federal Trade Commission (FTC) is working with dozens of organizations around the world to put pressure on Internet service providers (ISPs) to take voluntary steps, such as quarantining infected computers to try to reduce the onslaught of spam sent through so-called “spam zombies,” computers that have been hijacked to send spam.

Quick Bytes: Security product holes.

- The late gonzo journalist Hunter S. Thompson once wrote, “Kill the head and the body will die.” For IT professionals, the phrase might be reconfigured “Kill the security products and the network will die,” as was the case with last year’s Witty worm that targeted security software and infected systems worldwide in 75 minutes. Such attacks on security software are increasing, according to the Yankee Group’s

Quick Bytes: The weakest link

- Thirty-five percent of the world’s top 100 global financial institutions were victimized by attacks from within their organizations (versus 26 percent from external sources), up from 14 percent the previous year, according to the 2005 Global Security Survey conducted by Deloitte Touche Tohmatsu.

A Site to See.

- Keeping up with the newest electronic gadgets is one of the best parts of a technophile’s day. Happily, there are plenty of Web sites and blogs dedicated to breaking the news of whatever’s newest and hottest on the market.

Worth a Look: A Firewall for Road Warriors

- Working from home, you can set up your computer so that it is protected by a layer of defenses. For example, I have a firewall on my wireless router as well as a firewall running on the computer itself. But when the average user travels, there are typically fewer layers available to protect the portable computer from the inherent hazards of the Internet.

Defending Networks Against Targeted Trojans

- Protecting networks against worms and viruses is a trying task. Protecting against a threat targeted specifically at your network is even tougher. That’s a lesson that several Israeli companies learned earlier this year when they discovered that customized Trojan horse programs had been installed on their system, allowing industrial spies access to their networks.

Kill the Zombies

- FTC announces Operation Spam Zombies to reduce spam.

The Dr. Who Conundrum

- Find out why placing too much faith in technology leads to failure.

Defining Moment


Market Forces vs.Legislation: What’sYour View?

- In the wake of multiple high-profile thefts of consumer information, the protection of personal data held in business databases has become a hot topic. Some legislators have introduced bills that would hold companies liable for inadequately guarding sensitive data as one way to encourage greater security.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.