Security problems have become perhaps the biggest headache in the high-tech industry today.
Viruses and worms regularly bog down Internet traffic and turn employees' e-mail boxes into bogs of unwanted messages. Companies and individuals have also had to grapple with spam, fraud and theft of confidential information.
The government has declared that broadband Britain is to become reality by 2005, and that progress towards this target is being made quickly.
Oftel, the UK telecoms watchdog, confirmed that the one million broadband connection landmark was reached in October 2002, and a recent survey by the British Chambers of Commerce revealed that 40 per cent of UK companies now have broadband connections.
If Britain leads the G7 as a broadband nation, one question should be asked: how safe is it to enter personal data online?
Biometric security devices -- which authenticate a person's identity on the basis of physical characteristics, such as a fingerprint -- have been available in one form or another for 30 years. But biometrics technology for computer security and user authentication might never achieve widespread use, analysts told TechNewsWorld, because of the predominant perception that it is costly, inconvenient and intrusive.
Microsoft may be releasing details of vulnerabilities every week but it is yet to tackle the 30 unpatched holes in Internet Explorer which have been documented by well-known security researcher Thor Larholm.
Larholm, a former black hat and now a senior security researcher with PivX Solutuions, said today that seven more vulnerabilities had been added to the list he maintains, all of them having been discovered by Chinese researcher Liu Die Yu.
Organizations that use Microsoft's Windows software were scrambling Thursday to patch vulnerable systems after the company sent word on Wednesday of three more critical Windows software vulnerabilities. Marathon patching sessions, antivirus updates, and expressions of frustration with the Redmond, Washington software maker were the norm, as systems administrators rushed to protect themselves from any other Blaster-style worm that may appear and exploit the new security holes.