FRAMINGHAM (11/11/2003) - A colleague at Digex describes Pamela Fusco as a madwoman. It's a compliment--although when the comment is relayed to Fusco, her response is to quip, "Really? Remind me to restrict his network access." Fusco is chief security officer at Digex Inc., an Internet hosting company headquartered in Laurel, Md. She's a Navy intelligence veteran, married to another security professional, and she talks about the challenges of information security with unabashed enthusiasm. So is it surprising that Fusco and Digex don't sit back and wait for trouble to find them?
Stories by Ann Harrison
Reuters reported earlier this month that senior members of Congress are pressuring the US Department of Justice to put peer to peer (P2P) file traders in federal prison.
Microsoft Corp. this week said it's looking at altering the next version of its Internet Explorer browser to allow users to more easily disable the software's "persistence" feature, which lets Web sites gather some information about Internet usage and identify return visitors even if they have turned off Explorer's ability to accept Internet cookies.
Microsoft said it's looking at altering the next version of its Internet Explorer browser to allow users to more easily disable the software's "persistence" feature, which lets Web sites gather some information about Internet usage and identify return visitors even if they've turned off Explorer's ability to accept Internet cookies.
Information technology managers said they're on guard against a new distributed denial-of-service attack tool called Trinity that preys on Linux servers and uses Internet Relay Chat channels to unleash IP packet floods on targeted host machines.
Several information technology managers said they've gone on guard to protect their systems against the Trinity distributed denial-of-service attack tool, which came to light earlier this week as a vehicle for using Internet Relay Chat channels to unleash floods of IP packets from compromised Linux servers.
French information technology giant Bull SA acknowledged Aug. 31 that an internal sales and marketing database loaded with customer contact names and network configurations was exposed on one of its data-processing servers.
Online merchants are liable for hundred of millions of dollars worth of fraudulent purchases each year, but few flat-fee payment services screen for credit-card fraud at the point of purchase.
Unsuspecting attendees logging on to the wireless network at the Def Con hackers convention here last weekend immediately found themselves targets in the event's annual "capture the flag" hacking competition. One visitor found his machine pinged within 10 seconds and had several of his Windows utilities disabled within minutes - but that was all part of the fun.
EarthLink Inc., an Atlanta-based Internet service provider, says it has reached an agreement with the U.S. Federal Bureau of Investigation in which the agency has agreed not to install its Carnivore Internet surveillance system on EarthLink's network.
Microsoft stance violates open-source ethic, says engineer
The Microsoft Office Assistant, the talking paper clip that Microsoft has cited as an example of its software innovation during the US Government's antitrust investigation, has been found to include a security hole that allows attackers to take over a user's computer.
A flawed ActiveX control makes computers running Microsoft Corp.'s Internet Explorer Version 5.0 or Microsoft Office 2000 vulnerable to virus infections on most e-mail systems even if users don't open infected attachments, according to a computer security think tank.
Of all the variations of the "I Love You" e-mail virus that emerged late last week, computer security experts said one that entices users with a come-on about a Mother's Day gift order is the most clever -- and the most dangerous.