|
Public WiFi hotspots risks | Hits:3 |
Access to the Internet via public hotspots is growing and will continue to grow as more and more hotspots are made available. We have McDonalds offering free Internet access and even Boris Johnson proposing that London becomes a WiFi city,... | 2009-02-12 |
Ignorance of security policy does not exempt from security breaches | Hits:2 |
Most large organizations maintain a detailed corporate security policy document that spells out the dos and don ts of information security. Once the policy is in place, the feeling is of having achieved nine-tenths of the law , that is... | 2009-02-12 |
Comodo Endpoint Security Manager alerts IT administrator of suspected and prevented threats | Hits:4 |
While competing security software companies continue to patch their software to prevent possibly disastrous threats, zero-day attackers can be exploiting known vulnerabilities before a patch can be issued. Comodo Endpoint Security Manager ... | 2009-02-12 |
Many workers in the office environment do not pay attention to security because of a false sense of | Hits:3 |
Cybercrime refers to criminal offences committed with the aid of communication devices, usually over the Internet. Anyone with a smattering of online knowledge should know something about some of these online dangers, even if... | 2009-02-12 |
From phishing scams to pharming | Hits:1 |
Recent press abounds with new, innovative spam and phishing attacks. For years it was just email that organisations had to fear, but this has changed rapidly with attacks now appearing from all directions. Instant messaging, message boards... | 2009-02-09 |
G4S Security Services launches specialist vacant property service | Hits:2 |
With the number of empty properties likely to increase, property managers need to be aware of the potential risks associated with leaving these buildings unattended. Vacant premises remain a tax liability, with overheads that still need to... | 2009-02-09 |
Protegrity debunks Data Security Myths | Hits:2 |
Protegrity has compiled a list of the Top Ten Data Security Myths 1. If we buy the right security solutions, our data will be protected No matter how much money you frantically throw at vendors, enterprise data will remain vulnerable until... | 2009-02-09 |
Unpatched security vulnerability in Internet Explorer 7 is being actively exploited | Hits:2 |
An unpatched security vulnerability in Internet Explorer v7 is being actively exploited in-the-wild. Worryingly, the successful exploit of this vulnerability allows attackers to control the infected computer and access any personal... | 2009-02-09 |
Massive layoffs in the financial services sector have created a ticking security time bomb | Hits:2 |
Courion Corporation has warned that massive layoffs in the financial services sector over the last few months have created a ticking time bomb in the financial services industry, putting confidential consumer or corporate information... | 2009-02-09 |
There has been as much malware in the first months of 2008 as in the previous 17 years combined | Hits:2 |
Between January and August 2008, Panda Security s laboratory had detected as many malware strains as in the previous 17 years combined, and this tendency is expected to continue or even grow in 2009. PandaLabs has predicted a... | 2009-02-09 |
Overseas five model of outstanding firewall software simple introduction (chart) | Hits:3 |
What the firewall refers to is one becomes, the protection barrier which by the software and the hardware equipment combination between the intranet and the exterior net, the private network and on the... | 2009-01-20 |
The straightforward procedure establishes the Vista system bringing firewall | Hits:2 |
Bringing firewall's operation is very simple in view of Windows the Vista, the primary contact who suits Windows Vista studies, how does below teach you to carry on the establishment. Establishment step Turns on the control panel, in... | 2009-01-20 |
Helps you to become kills applies master's five moves poisonously | Hits:2 |
Everybody knew that the computer must install kills the poisonous software, otherwise the virus will invade own computer to collapse at the first blow. But everybody is not actually clear, why already installed has killed the poisonous... | 2009-01-19 |
The novice fosters the HIPS system firewall chat | Hits:3 |
Develops the path HIPS (main engine invasion defensive system), is named by the net friend as the system firewall (non-XP the SP2 firewall), but through ways and so on judgment rule, interception behavior, for system loading protective... | 2009-01-19 |
Helps you to become kills applies master's five moves poisonously | Hits:2 |
Everybody knew that the computer must install kills the poisonous software, otherwise the virus will invade own computer to collapse at the first blow. But everybody is not actually clear, why already installed has killed the poisonous... | 2009-01-14 |
The novice fosters the HIPS system firewall chat | Hits:5 |
Develops the path HIPS (main engine invasion defensive system), is named by the net friend as the system firewall (non-XP the SP2 firewall), but through ways and so on judgment rule, interception behavior, for system loading protective... | 2009-01-14 |
Under CMD establishes the WINDOWS firewall as well as the actual use | Hits:3 |
Comes to select simply first, generally we are must close this firewall, completes with net stop sharedaccess, opening is net start sharedaccess naturally, but this I actually am must open it, for other, did not do a server preparation... | 2009-01-12 |
Installs firewall's 12 matters needing attention | Hits:3 |
The firewall is protects our network the first barrier, if this defense line has fallen into enemy hands, then our network was dangerous! Therefore we have the necessity to pay attention install firewall's matters needing attention! 1.... | 2009-01-12 |
Helps you to become kills applies master's five moves poisonously | Hits:9 |
Everybody knew that the computer must install kills the poisonous software, otherwise the virus will invade own computer to collapse at the first blow. But everybody is not actually clear, why already installed has killed the poisonous... | 2008-12-16 |
The novice fosters the HIPS system firewall chat | Hits:5 |
Develops the path HIPS (main engine invasion defensive system), is named by the net friend as the system firewall (non-XP the SP2 firewall), but through ways and so on judgment rule, interception behavior, for system loading protective... | 2008-12-16 |
Under CMD establishes the WINDOWS firewall as well as the actual use | Hits:16 |
Comes to select simply first, generally we are must close this firewall, completes with net stop sharedaccess, opening is net start sharedaccess naturally, but this I actually am must open it, for other, did not do a server preparation... | 2008-12-11 |
Installs firewall's 12 matters needing attention | Hits:8 |
The firewall is protects our network the first barrier, if this defense line has fallen into enemy hands, then our network was dangerous! Therefore we have the necessity to pay attention install firewall's matters needing attention! 1.... | 2008-12-11 |
Public Sector organisations admit to poor attitudes towards treatment of confidential data | Hits:2 |
Research from Clearswift has found that public sector organisations are not dedicating enough time and resource to Information Assurance (IA), putting them perilously at risk of suffering from data breaches. According to the first piece of... | 2008-12-02 |
McAfee announces comprehensive virtualised server security suite | Hits:2 |
Virtualisation gives organizations the ability to consolidate servers to share physical resources including processors, memory, and disk space. Companies are quickly adopting virtualisation to increase infrastructure utilisation,... | 2008-12-02 |
AppGate adds support for soft certificates in its mobile VPN Clients | Hits:2 |
AppGate's new mobile VPN client supports soft certificates, enabling improved user authentication with no added complexity for the user. With this development, mobile phones no longer have to be the security exception... | 2008-12-02 |
|