Site Map - IT

Capitalist Crooks

- Security researchers see 2005 as the year in which cyberattackers turned from braggarts to capitalists.

Land of Phishing

- Websense, a provider of employee Internet management solutions, offers updates on phishing attacks.

Identity Theft Can Be Fun

- The Federal Trade Commission now offers an amusing online quiz about the basics of identity theft, spyware, phishing, and other scams. It also teaches users how to obtain a free credit report, use sufficient passwords, report identity theft, and otherwise protect themselves from identity thieves. @ The site, onguard online, also provides links for sending information on scams and attacks to government authorities. get there via SM Online

Quick Bytes: Proliferating Bots

- The growth of malicious Web robots, or bots, this year will likely surpass the 413 percent growth rate seen for rootkits last year, according to a Sana Security warning.

Quick Byes: Wireless holes

- Computer vulnerabilities are well documented by Web sites such as the one hosted by The Mitre Corporation known as Common Vulnerabilities and Exposures (CVE). Vulnerabilities in wireless systems, including 802.11 and Bluetooth, now are getting similar attention.

Quick Bytes: Lost message, lost time

- If you’ve ever wasted time searching for an e-mail you know you’ve sent or received but can’t locate, you’re not alone: 59 percent of all U.S. adults have done it (the number is 6 percent higher for those who make more than $75,000 a year).

NEW IN PLAINTEXT: Securing Windows XP

- More than seven out of 10 home computers run Windows XP, so locking down these computers is an essential task, because poorly protected home computers are often the source of attacks against corporate networks.

Worth a Look: Web Browsing Under Wraps

- Anonymizer Anonymous Surfing prevents Web sites from collecting data from your visits because it creates an encrypted tunnel between your computer and the Anonymizer network while you surf; then, any page you visit will see Anonymizer’s IP address, not yours. The software installs after a quick download and can be used with either Internet Explorer or Firefox browsers.

The Detective and the Database

- Combining investigative know-how and computing power can help security professionals find crime clues hidden in databases.

Phone forensics

- Now that cell phones have morphed into miniature computers, they contain more information than ever before. In addition to phone numbers and a record of calls made and received, phones can now contain e-mail or text messages, photos, and a host of other data that could be of value when investigating a crime.

Scans and Attacks

- A paper entitled An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack describes the results of an experimental approach to determine the correlation between port scans and attacks.

Spam Canned?

- The FTC has released Effectiveness and Enforcement of the CAN-SPAM Act, which concludes that the law has been effective in slowing down spam.

Defend I.T.: Security by Example

- The authors do, however, assume a basic level of network and security understanding. The case studies show what system and network administrators can do to protect their networks from the most common attacks.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.