New Endpoint Platform and Client-Server suite should take out some of the legwork, company promises
![](https://www.silicon.co.uk/wp-content/uploads/library-extension/itbellwether-120x90.jpg)
New Endpoint Platform and Client-Server suite should take out some of the legwork, company promises
An Amazon.com glitch reduced the sales rankings of 57,000 titles - but something isn't right about the story of the hacker who claimed to have caused the problem
Adobe's Flash player and Acrobat software were the top targets for hackers attempting to install malware on Europe's PCs during 2008, according to security researchers at Symantec.
Security professionals should try to add value to business and make new business models possible, instead of focusing on restricting users, says Mike Small of CA.
Experts contend the simple ability to map the electrical infrastructure is not the same as knowing how the system is operated or controlled
A court has ruled that Microsoft's piracy-busting Product Activation system used technology patented by someone else. Meanwhile it was fined in Germany over pricing
The hackers behind the infamous Conficker worm are making their move, roughly a week after many people expected
Storing and securing data more efficiently is the way IT managers are going to have to go during the recession
Foreign spies placed malware on the US electricity grid. Where does this leave government security, and the Green Grid?
From next week, Microsoft Windows XP and Office 2003 support and fixes will cost money. But that is much better than competitors' offerings, says Larry Seltzer - and that includes open source
The HyTrust Appliance is designed to give IT administrators greater control over their virtual environments and ensure greater security and compliance
The government has awarded contracts to CSC and IBM to upgrade biometric passports and other systems that will pave the way for ID Cards
Creating a more efficient and secure way to exchange such medical information will lead to better patient treatment and improved public health, supporters say
If successfully exploited, the PowerPoint bug could enable hackers to take control of the victim's computer
If successfully exploited, the attacks give the hacker complete control over the database server operating system, file system and the rest of the internal network machines.
Wi-Fi has become an essential feature of smartphones, and more apps are using it. But they may not be secure, warns Andrew Garcia
April 1 has come without major trouble from the worm, but users should remain vigilant, apply the existing defences - and beware fake patches
There is a 10 to 20 percent risk of a major failure in communications networks within the next 10 years, according to the European Commission.
Security vendors are taking advantage of a discovery by two members of the Honeynet Project who uncovered a new way to detect the Conficker worm on infected PCs.
Security threats like Conficker, along with the regulations and measures to combat them, are a nightmarish waste of resources, says Peter Judge
A major update is due for Conficker on Wednesday. But should we fear such a well-understood piece of malware?
Psyb0t exposes router and broadband vunerabilities.
Security flaws reported in Google Docs have been described. If Google doesn't take these reports seriously, it will lose the enterprise users it is gaining, says Michael Hickins
Google says that security concerns about its online document service Google Docs are "not significant", despite claims that users can access material to which the author has denied access.
30 percent of SharePoint servers are deployed outside the management of the IT department.
There's plenty you can do to protect yourself against malware. The best precautions are tough policies, common sense and experience, there's no magic off-the-shelf solution.
Why do we still have spam, when we have the tools to eliminate it? Because the spam problem is simply not compelling enough, says Larry Seltzer
IE 8, Firefox and Safari all need to keep boosting security, even though hackers are concentrating on Web applications
A new police e-crime unit will help combat the threat, according to payments industry body
Security researchers have released proof of concept exploit code for an Intel chip flaw that could be abused to compromise computer systems