INFORMATION

Site Map - IT

Password Encryption

- Check out a free new Windows utility that lets users securely encrypt all their passwords on their computer.

Malicious E-Mail

- There’s been a sharp decrease in the amount of malicious e-mails sent in the first half of 2007, says a top security vendor. Likely reasons include better network defenses and a growing caution among employees about opening suspicious attachments.

Cyber Citizen-Warriors

- Some ordinary Americans are tracking down jihadi Web sites and applying pressure to service providers to shut them down.

IP Surveillance Cameras Can Be Hacked

- Researchers say cameras which stream their images over an IP address can be hacked and used to attack the network behind the camera.

Don’t be Spooked by Spyware

- Find out what spyware is and how to avoid it.

Darknet: Hollywood’s War Against the Digital Generation

-

A Site to See

- The del.icio.us site also provides a location for saving personal bookmarks that can be accessed from any computer so that if you’re on the road and want to visit a bookmarked page but don’t have your regular computer, you can find the links easily nonetheless. Best of all, the site is completely free.

Quick Bytes: Zero-day approaches

- The time between the disclosure of a computer vulnerability that can allow infection by a worm or virus and the release of an exploit that can attack that vulnerability has dropped from 6.4 days to 6.0 days.

Quick Bytes: Password frustration

- How many passwords do you need to remember? A survey by RSA Security Inc. of 1,700 enterprise technology end users found that 71 percent had as many as 12, and almost one-quarter had more than 15.

DOT’s Security Off Track

- When the Zotob worm appeared only days after Microsoft released a patch that would have prevented infection, 700 Department of Transportation (DOT) computers were infected after a contractor connected a laptop to the DOT’s network against the department’s policy.

Worth a Look: Fencing Out Malicious Code

- Wayward wireless networks, a quarantine for malicious code, and infosec troubles at the Department of Transportation.

The Perils of Wireless Networking

- Wayward wireless networks, a quarantine for malicious code, and infosec troubles at the Department of Transportation.

Zero-day approaches

- The time between the disclosure of a computer vulnerability that can allow infection by a worm or virus and the release of an exploit that can attack that vulnerability has dropped from 6.4 days to 6.0 days. Meanwhile, the average time between the appearance of a vulnerability and the release of a patch is 54 days. Those statistics, which come from antivirus vendor Symantec’s most recent Internet Security Threat Report, are even more frightening when you consider that 1,862 new vulnerabilities were found in the first half of 2005. @  The Symantec report is available at SM online.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.