Microsoft's CardSpace attacked by researchers
Identity theft predates the Internet, and if even the best-laid plans for combating it are destined to go astray, there's bound to be crime aplenty ahead. According to researchers who have examined Microsoft's CardSpace system, that particular plan diminishes risk -- but could never eliminate it.
Read more...
Gartner: Be cautious about letting new iPhones into your company
Cisco PIX security users get green trade-in offer
Microsoft hits 21 U.S. resellers with piracy lawsuits
Microsoft releases public beta of identity management server
Security vendors roll out full-disk encryption support for Macs
Tandberg touts superfast mini tape library
Symantec tool cleans up XP SP3 registry corruption
Symantec tells users: Disable protection before XP SP3 upgrade
Speed is of essence for next-generation Symantec products
More Security Hardware and Software Stories
10 essential (and free!) security downloads for Windows
Security and privacy protection doesn't have to cost a lot — or indeed anything at all. These 10 great freebies will keep you safe from prying eyes and bad guys.
Review: Satellite notebook protects itself with faces instead of fingerprints
Toshiba's latest Satellite notebooks offer face recognition software, but the technology may not yet be ready for prime time.
Opinion: Where are those infosec jobs?
Those news reports of vastly increased information security spending just around the corner may sound awfully cheerful, but Jon Espenschied detects some lazy -- or is it wishful? -- thinking.
Review: PC Tools ThreatFire 3.5 antivirus software
Now in version 3.5, this free utility adds an extra layer of protection to the security software you already have. It blocks an impressive number of threats through behavior-based analysis.
ZoneAlarm ForceField: Two defenses are better than one
Check Point Software's ZoneAlarm ForceField provides an extra defensive layer by cloning your Web browser to catch dangerous software before any damage can be done.
Q&A;: Schneier says cybercrime problem 'might not be fixable'
Bruce Schneier, CTO at managed security services vendor BT Counterpane, said in an interview that making things harder on cybercrooks may require actions that financial services firms won't like.
The future of antivirus
Does malware exist only because antivirus products are around to combat it? It's a provocative thought. CSO's Michael Fitzgerald looks at the state of the AV art these days, asks the experts if there's any way out of the malware arms race, and finds hope at an unlikely source.
Free and cheap software that outdoes the big guys
Here are 15 mostly free applications that can credibly replace big-bucks PC software.
Review: 7 secure USB drives
With almost daily stories about data loss or breaches in the press, Computerworld decided to review seven USB drives from top vendors, based mostly on security and ease of use. We looked at everything from a drive built to military specifications, to one that even hides your Web searches.
Services tap people power to spot malware
People-driven security, which uses the wisdom of crowds to identify new malware, spam and similar threats, is starting to gather momentum as users take to the community-service nature of the endeavor.
Intel's x86 microprocessor architecture has dominated large swaths of computing for three decades. Here's why.
The notebook we use in five years might look a lot like the XO 2.0 clamshell, a prototype of the next version of the OLPC laptop.
Apple's splash into the cell phone market proved consumers will pay for hip devices. Now the race is on to one-up the iPhone.
NASA engineers and programmers are writing code each day to send to Mars to control the Mars Lander, which is gathering and testing soil on the surface of the planet.
Reviews, analyses, how-tos, visual tours, hot issues and predictions about Microsoft's new OS.
Four years from now, the IT field will be a vastly different place. Will you be ready?