After repeatedly denying their parent company's attempts to bring them back into the corporate fold, McAfee.com's special board of directors last Friday recommended that the company's shareholders tender their stock to Network Associates, bringing the two companies one step closer to reunion.
Stories by Sam Costello
Firewall and virtual private network hardware and software maker NetScreen Technologies Inc. is adding intrusion detection and prevention systems to its list of products, thanks to the acquisition of OneSecure Inc.
A security vulnerability in a tool used by developers and select customers to download software from Microsoft Corp. Web sites could allow an attacker to take over vulnerable systems, according to a security alert distributed by Microsoft to some developers Tuesday.
The U.S. Attorney's Office for the District of New Jersey is investigating a two-year old software licensing deal between Lucent Technologies Inc. and Winstar Communications Inc.
A buffer overflow in the ToolTalk RPC database server used in the Common Desktop Environment (CDE) on systems from vendors such as Sun Microsystems Inc. and IBM Corp. could allow an attacker to run code with root privileges, according to a security alert released Monday by the CERT Coordination Center (CERT/CC).
Internet Security Systems (ISS) announced an upgrade to its RealSecure Desktop Protector software that provides security features on desktop PCs, adding more security features to work with VPNs (virtual private networks), as well as features designed to block the spread of worms and other unwanted applications.
Looking to provide protection for what it sees as the growing numbers of Linux users, Trend Micro Inc. Monday announced a trio of new antivirus and content scanning products for gateways, groupware and servers in conjunction with the LinuxWorld Conference and Expo being held in San Francisco this week.
A security hole in the widely used Macromedia Inc. Shockwave Flash file format used with Web browsers can allow an attacker to execute code of their choice on affected systems, according to a new security alert released Friday by eEye Digital Security Inc.
A security hole in Sun Microsystems Inc.'s Sun One and iPlanet Web servers can allow an attacker to launch a denial of service attack on the server and to run attack code of his or her choice, according to a security alert released Friday by eEye Digital Security Inc.
A series of security holes in the Google Inc. Toolbar, an application offered by the popular search engine that adds easily accessible search features to Web browsers, could allow an attacker to read files, reroute searches and execute scripts on an affected PC, according to a security alert released Thursday by GreyMagic Software.
A security hole in the XDR (External Data Representation) Library provided to a number of vendors by Sun Microsystems Inc. could allow an attacker to execute arbitrary code on an affected system or cause a denial of service, according to an advisory released Tuesday by the CERT Coordination Center (CERT/CC).
Italians visiting Iowa and Americans travelling in Australia will be able to use their existing GSM (Global System for Mobile communications) phones on local networks, thanks to a tidal wave of new international roaming agreements announced by AT&T Wireless Services Tuesday.
Hacking is not about creating viruses, breaking into computer systems or even rainbow-dyed hair, but is instead about the search for truth, critical thinking and the pursuit of knowledge, according to Richard Thieme, an author, consultant and former Episcopal priest, who addressed attendees here Saturday.
The Black Hat security conference being held in Las Vegas does not normally feature many new product announcements, but BindView Corp. and Procinct Security Corp. are bucking that trend, with each company announcing a new Web-based security service.
In a move designed to give users a greater range of devices to connect to virtual private networks (VPNs), Check Point Software Technologies Ltd. announced three feature upgrades to its software Tuesday.
- Senior Project Manager VIC
- Service management Business Analyst NSW
- Business Information Security Officer (BISO) NSW
- SAP BPC Specialist Consultant TAS
- Integration Analyst NSW
- Senior DevOps Manager VIC
- MS Dynamics Technical Consultant - Sydney NSW
- Senior Business Analyst - Business Case - Risk & Compliance - Contract NSW
- Cyber Security Analyst - Telco VIC
- Business Analyst QLD
- Free Whitepaper! Learn how to create an analytics environment that is governed, scalable and self-serve.
- Free Whitepaper! Learn how IT is evolving from producer to enabler, and fostering collaboration around analytics.
- Free Whitepaper! The 5 criteria to help you select the right analytics platform for your organization.