HomeCybersecurity

Cybersecurity

Yahoo Zaps MusicMatch Jukebox Flaws

Yahoo has shipped new versions of its MusicMatch Jukebox media player to fix security holes that could put users at risk of buffer overflow...

Forum Systems Plans XML Anti-Virus Firewall

Web services security pioneer Forum Systems on Monday announced plans to add virus protection to its flagship XML Firewall product. Forum Systems Inc., of Salt...

Trend Micro Flaw Accelerates CPU Consumption

A faulty virus pattern file that Trend Micro released on Friday resulted in higher-than-normal CPU consumption, causing system slowdowns and problems for some of...

Group Aims to Develop Guidelines to Define Spyware

Even as the menace grows, security vendors are having increasing difficulty defining and identifying spyware, and their indecision is slowing efforts to assist frustrated...

Sunbelt Scoops Up Google-like Spyware Sniffer

Anti-spyware vendor Sunbelt Software said it acquired Web-crawling technology that will enable its researchers to identify new spyware outbreaks more quickly. The company plans to...

The Sad State of Spyware

Theres reason to be optimistic about many security problems, but others are less encouraging. One of the worst is the problem of spyware and...

CA Drafts New Policy for Spyware Vendor Appeals

Computer Associates International Inc. is changing its policy for handling appeals from suspected spyware vendors.CAs eTrust PestPatrol unit will no longer remove detection signatures...

Microsoft Confirms Critical Win2K Flaw

Software engineers at Microsoft Corp.s security research center on Thursday confirmed a potentially dangerous security hole in fully patched Windows 2000 systems that could...

Microsoft, VeriSign Team on Wi-Fi Security Architecture

Citing the increased risk posed by mobile workers and wireless networking technology, Microsoft Corp. and VeriSign Inc. said on Wednesday that they are teaming...

Worm Early Warning System Late to the Game

In some ways, network worms are the scariest of Internet attacks. The idea that your computer can be attacked while just sitting around minding...