Security Bytes:

June, 2007


June 29, 2007  1:43 PM

3Com plans to spin off TippingPoint via IPO

David Schneier David Schneier Profile: David Schneier

3Com is planning an IPO for its TippingPoint security unit some time in the near--or not-so-near--future. The networking company announced the plan Thursday via a short press release...

June 29, 2007  8:04 AM

Web watchers warn of new Storm attack

Leigha Leigha Cardwell Profile: Leigha

The prolific Storm malware is on the attack again, according to the folks at the SANS Internet Storm Center (ISC). ISC handler Lorna Hutcheson wrote on the storm center Web site that the latest email attack includes a subject line that...


June 29, 2007  4:33 AM

Thoughts on the iPhone security hype

Leigha Leigha Cardwell Profile: Leigha

Much has been made about the release of Apple's iPhone, including a lot of speculation on the security risks of using one. There's so much...


June 28, 2007  8:33 PM

Microsoft’s Howard posts analysis of DNS RPC flaw

David Schneier David Schneier Profile: David Schneier

The Windows server RPC vulnerability that caused so much consternation this spring was so easily exploitable because the vulnerable RPC interface was accessible anonymously, according to an


June 28, 2007  11:47 AM

Podcast: PCI DSS auditing and ethics

Leigha Leigha Cardwell Profile: Leigha


June 28, 2007  10:18 AM

Rutkowska’s Blue Pill rootkit to be put to the test at Black Hat

David Schneier David Schneier Profile: David Schneier

There's no security conference that's more fun to cover than Black Hat, and, judging by the roster of speakers, this year's Las Vegas edition looks to be no exception. The session that's drawing the most pre-conference attention is one titled


June 28, 2007  8:34 AM

Morning security flaw report for June 28

Leigha Leigha Cardwell Profile: Leigha

Here are some of the latest vulnerability alerts, based on my Internet travels this morning: Check Point flaws The French Security Incident Response Team (FrSIRT) has issued two advisories about some security holes in Check Point products. The first advisory is about


June 27, 2007  3:18 PM

Why can’t Hollywood hack?

David Schneier David Schneier Profile: David Schneier

Despite the fact that most Hollywood movies are the products of computers these days, no one in La La Land seems to have the first clue what computers can and can't do. Or more accurately, what skilled hackers can do with computers. Exhibit A would be the egregious John Travolta vehicle "


June 27, 2007  11:11 AM

Security Wire Weekly podcast for June 27

Leigha Leigha Cardwell Profile: Leigha


June 27, 2007  8:06 AM

So many flaws, so little time

Leigha Leigha Cardwell Profile: Leigha

A number of vendors and other entities have addressed significant security flaws in their programs in the last few days. Here's a roundup: -- iDefense Labs has issued an advisory on flaws in RealPlayer, an...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: