If successfully exploited, the attacks give the hacker complete control over the database server operating system, file system and the rest of the internal network machines.
News Security
More Wi-Fi In Smartphones = A Security Risk
Wi-Fi has become an essential feature of smartphones, and more apps are using it. But they may not be secure, warns Andrew Garcia
Conficker – No Big Outbreak, But Threat Remains
April 1 has come without major trouble from the worm, but users should remain vigilant, apply the existing defences - and beware fake patches
EC: Major Cyberattack Could Cost £179bn
There is a 10 to 20 percent risk of a major failure in communications networks within the next 10 years, according to the European Commission.
Security Researchers Open New Front In Conficker War
Security vendors are taking advantage of a discovery by two members of the Honeynet Project who uncovered a new way to detect the Conficker worm on infected PCs.
Why Hackers And Regulations Cost The Earth
Security threats like Conficker, along with the regulations and measures to combat them, are a nightmarish waste of resources, says Peter Judge
Conficker: How Scared Should We Be?
A major update is due for Conficker on Wednesday. But should we fear such a well-understood piece of malware?
Psyb0t – The First Linux Botnet
Psyb0t exposes router and broadband vunerabilities.
Google’s Enterprise Credibility Is On the Line
Security flaws reported in Google Docs have been described. If Google doesn't take these reports seriously, it will lose the enterprise users it is gaining, says Michael Hickins
Google Denies Severity Of Google Docs Flaw
Google says that security concerns about its online document service Google Docs are "not significant", despite claims that users can access material to which the author has denied access.
Microsoft SharePoint – Are You In Control?
30 percent of SharePoint servers are deployed outside the management of the IT department.
Malware Is Getting Stronger, But All You Need Is A Little Common Sense
There's plenty you can do to protect yourself against malware. The best precautions are tough policies, common sense and experience, there's no magic off-the-shelf solution.
How The Spam Jam Became Business As Usual
Why do we still have spam, when we have the tools to eliminate it? Because the spam problem is simply not compelling enough, says Larry Seltzer
Web Browsers Need Better Security
IE 8, Firefox and Safari all need to keep boosting security, even though hackers are concentrating on Web applications
UK Online Fraud Up 132 Percent
A new police e-crime unit will help combat the threat, according to payments industry body
Intel Chip Flaw Could Be Used By Rootkits
Security researchers have released proof of concept exploit code for an Intel chip flaw that could be abused to compromise computer systems
AT&T Launches Smart Grid Despite Hacking Concerns
Security consultants have engineered a worm which can bring down smart grids - while AT&T launches a product and the UK backs the concept
Panda Updates Hosted Security Application
Panda says the updated release is up to 50 percent more efficient than traditional endpoint security
Adobe: Consider the Alternatives
With Adobe releasing further patches and vulnerability updates for Acrobat and Reader, the question has to be asked, is it time to take your business elsewhere and consider the alternatives?
Widespread IT Broadens The Attack Surface
Threats are growing, and companies simply do not have the option to ignore the problem. This will drive a more diverse, service-driven security model, says IBM's Marc Van Zadelhoff
Free Security Analyser from Microsoft
Microsoft to launch open-source security analyser for application developers.
Microsoft IE8: An Essential Upgrade
Some features catch up with rival browsers, others add new abilities and security functions. If you are an IE user, you should read our guide, and get to know the new version
Microsoft Releases IE8
Security, ease of use, and improvements in RSS, Cascading Style Sheets and AJAX support are key priorities for Internet Explorer 8, according to Microsoft
IBM/Sun: The Technology Fall-Out
If the merger goes ahead, IBM will have to make choices: Which database, which directory, and which virtualisation technology?
Recession Or No, We Are In It For The Long Haul
While all around are making short term decisions, you have to keep you head, and make sure your long term goals are still in the picture, says Jonathan Steel
New Technologies vs Business Security
Social Networking and Cloud Computing are proving a headache for organisations.
GFI LANguard 9.0: Network and Security Scanner for SMBs
GFI LANguard network vulnerability and patch management software is most useful to SMBs.
Malware Uses Geo-location To Lure Victims
The minds behind the Waledac botnet are using the physical location of victims' machines in a scheme to lure them with false news reports.
How To Keep Control Of Employee-Owned PCs
Employees are increasingly using personal PCs in their jobs, and IT staff have to support them. eWEEK Labs explores some of the tools to keep employees productive and corporate data safe.
“British Botnet Corporation” Should Apologise
What the BBC did was wrong. The corporation should stop defending its botnet antics, and act responsibly