Is a digital doomsday around the corner?
With hackers developing new methods of targeting us as quickly as we come up with defences, just how fragile is our wired economy?
Ten security laws you can rely on
Microsoft's Security Response Center gets many thousands of calls for help with security problems. Here are the top ten laws, gleaned from those calls, that you can guarantee will crop up time and time again.
Is hard time for worm author too harsh?
Teenager sentenced to 18 months for writing a MSBlast worm got his just deserts, according to a Web poll. What's your take?
Fix major Microsoft Office flaws
A Chinese academic has revealed a major problem with the way Microsoft's encryption tool handles Word and Excel files. This flaw could allow a cracker with basic cryptography skills to decrypt the files.
Crisis strikes: What do you do next?
The corporate Web site is gone and a hacker has made off with the database. The company's reputation is at stake. What crisis management tactics should be employed?
How to create a password policy
Passwords are key to network security, so it's essential to have a strong policy in place to ensure they are kept secure. We give you some pointers as to how this can be done.
Detect intruders in Microsoft IIS
It is not necessary to spend thousands of dollars on intrusion detection for Microsoft's IIS Web servers. Attacks to these public servers typically focus on only a small handful of programs. We show you what to look for.
Should security researchers keep mum?
By making coding flaws public, are security researchers exposing users to unnecessary risk? Some believe only full disclosure keeps vendors honest. Flaw finders, however, disagree.
Is MS AntiSpyware worth your time?
The anti-spyware software recently announced by Microsoft is now mature enough to evaluate but is it a godsend?
Preparing for a doomsday attack
Things could get rough if bad guys blend physical and virtual attacks, says VeriSign CEO Stratton Sclavos.
Microsoft's alpha tester
If anyone has a right to complain about buggy Microsoft products, it's Ron Markezich, the software maker's chief information officer. In this interview, he tackles several issues including the company's no Linux policy.
Pest control: Battling spyware
To help curb the torrent of spyware, ZDNet Australia presents a spyware superguide comprising the latest reviews, tips and tricks aimed at keeping users safe.
Tech execs: Wake up and smell the spam
It is vital that the tech industry raises awareness of the scale of the problem of junk e-mail, industry experts said.
False promises about ending spam
CNET News.com's Charles Cooper asks whether the tech industry is only kidding itself about what it will take to fight the plague.
How to attack spammers in your sleep
Plans are afoot to attack spammers by launching the kind of cyber-attack favoured by organised crime and hackers with an axe to grind.
Call to arms against cybercrooks
The CTO of betting exchange Betfair says that more cross-industry cooperation is needed to prevent denial-of-service attacks against online businesses.
|