Infosecurity TodayPub Date : 2006-09-01DOI: 10.1016/S1742-6847(06)70452-9
SA Mathieson
{"title":"Hot stocks to your inbox","authors":"SA Mathieson","doi":"10.1016/S1742-6847(06)70452-9","DOIUrl":"10.1016/S1742-6847(06)70452-9","url":null,"abstract":"<div><p>Since the end of 2005, share-promoting spam has been cramming our email. Steven Mathieson investigates this phenomenon.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Pages 10, 12-13"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70452-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77069746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-09-01DOI: 10.1016/S1742-6847(06)70447-5
SA Mathieson
{"title":"UK plans prison terms for personal data abuse","authors":"SA Mathieson","doi":"10.1016/S1742-6847(06)70447-5","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70447-5","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70447-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91983746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-09-01DOI: 10.1016/S1742-6847(06)70462-1
Eldar Tuvey
{"title":"Web lets in new threats","authors":"Eldar Tuvey","doi":"10.1016/S1742-6847(06)70462-1","DOIUrl":"10.1016/S1742-6847(06)70462-1","url":null,"abstract":"<div><p>The rise of web threats and new communication tools demand a new approach to web security.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Page 43"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70462-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82815160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-09-01DOI: 10.1016/S1742-6847(06)70459-1
William Knight
{"title":"Computers that learn to spot the odd one out","authors":"William Knight","doi":"10.1016/S1742-6847(06)70459-1","DOIUrl":"10.1016/S1742-6847(06)70459-1","url":null,"abstract":"<div><p>Computers that learn from experience populate science fiction novels and manage dystopian cities. But imperceptibly, the technology has taken a central part in information security, and this role is set to expand.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Pages 37-38"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70459-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89819383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-09-01DOI: 10.1016/S1742-6847(06)70458-X
Cath Everett
{"title":"Sophos: wise guys spread their bets","authors":"Cath Everett","doi":"10.1016/S1742-6847(06)70458-X","DOIUrl":"10.1016/S1742-6847(06)70458-X","url":null,"abstract":"<div><p>While Sophos is hitting many of the right buttons for customers in the content security space, for this situation to continue into the long-term, the company needs to broaden out its product line and find new engines for growth.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Pages 33-35"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70458-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88572711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-09-01DOI: 10.1016/S1742-6847(06)70449-9
Ian Grant
{"title":"UK to track US on drug traceability","authors":"Ian Grant","doi":"10.1016/S1742-6847(06)70449-9","DOIUrl":"10.1016/S1742-6847(06)70449-9","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Pages 6, 8"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70449-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85634168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-09-01DOI: 10.1016/S1742-6847(06)70451-7
Brian McKenna
{"title":"Security technology fundamentally flawed, says ex White House CIO","authors":"Brian McKenna","doi":"10.1016/S1742-6847(06)70451-7","DOIUrl":"10.1016/S1742-6847(06)70451-7","url":null,"abstract":"<div><p>Former White House CIO Carlos Solari recently joined Lucent Technologies. He has 25 years experience in American government and private industry positions, including 13 years as an officer in the US Army, and more than six years as a senior executive with the FBI.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Page 9"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70451-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76889145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-09-01DOI: 10.1016/S1742-6847(06)70450-5
Eric Doyle
{"title":"EMC buys RSA Security for $2bn. Have they gone mad?","authors":"Eric Doyle","doi":"10.1016/S1742-6847(06)70450-5","DOIUrl":"10.1016/S1742-6847(06)70450-5","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Page 8"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70450-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76908621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}