Your are here:hacking technology > hacker course > Article list

Home > hacker course > Page 4
Brad Pitt and Justin Timberlake are the gef?Dangerous for people to search the webHits:2
Cyber criminals use the names of the A-Listers and images, like Beyonce and Justin Timberlake, Internet users to surf the Web K?for the latest gossip, screen savers and ringing?ne on falseWeb sites that look legitimate. Brad Pitt Paris...2010-08-05
XcelleNet Introduces Afaria Security Manager to Protect Mobile DevicesHits:17
XcelleNet, Inc.has announced Afaria Security Manager, a solution for securing handheld devices and the data on them. Security Manager eliminates the most significant risks associated with deploying and managing technology...2009-08-12
Dutch Ministry Deploys ActivCard Authentication for Netilla Remote Access SolutionHits:2
ActivCard and Netilla Networks have announced that the Netherlands Ministry of Transport, Public Works and Water Management has implemented their combined solution for secure remote access. Working with leading Dutch systems integrator...2009-08-12
Web Application Hacking: Exposing Your BackendHits:13
We used to have simple web sites. The web server sent HTML to the browser which displayed it. This was a brochureware site; designed for marketing or advertising. There was no business data anywhere near the web site. Now we no longer have...2009-08-11
KeyFocus announces the world's first Windows networking emulation honeypotHits:4
KeyFocus has announced the world's first Windows networking emulation honeypot, a key feature of the major new release of its flagship product KFSensor 2.0, its honeypot based intrusion detection system. This groundbreaking...2009-08-11
Don't let Crackers, Hackers or Thieves ruin your Christmas - leave your Handhelds at home!Hits:4
Leave your laptop or personal handheld at home when you join the Christmas rush and revelry or risk losing your mobile device and all the information which resides on it. This is the advice that mobile security experts Pointsec...2009-08-08
Saucy email distributes new Sysbug Trojan horseHits:4
There have been reports of a new Trojan horse - Sysbug (Troj/Sysbug-A). Distributed via a saucy email, this Trojan horse is disguised as an attachment promising naked pictures. If run, Sysbug allows hackers to gain unauthorised...2009-08-08
FaceTime and e92plus Announce Instant Messaging Management and Security Distribution PartnershipHits:3
FaceTime Communications has announced a partnership with UK based enterprise security distributor, e92plus, to extend the reach of its portfolio of IM security, management and control solutions to resellers, integrators and service...2009-08-07
Check Point Software Technologies To Acquire Zone LabsHits:3
Check Point Software Technologies and Zone Labs, Inc. have announced that they have signed a definitive merger agreement providing for Check Point to acquire privately held Zone Labs for 205 million. Check Point will pay approximately 113...2009-08-07
Biometrics have come of ageHits:4
Street research carried out at Victoria Station earlier this year revealed that 90% of people were willing to give their passwords to Infosecurity Europe researchers as part of a survey on identity theft the researchers did not give any...2009-08-06
New Bagle worm spreads over internet disguised as CalculatorHits:4
Following many reports in Australia, multiple reports are coming from the UK and other countries, and users are advised to be cautious of emails received over the weekend with the subject line Hi . The Bagle-A worm (also known as Beagle)...2009-08-06
Diagonal Security named as KaVaDo Premier Partner in the UKHits:6
KaVaDo Inc. has announced that it has chosen Diagonal Security to be its premier partner in the UK. Paul Murray, Managing Director of Diagonal Security said, KaVaDo is the company we have chosen to partner with because they are leaders...2009-08-06
International Trading ProblemsHits:10
8-13 October 2000 - International Trading Problems: The 15th Intensive Practical Training Course on Pitfalls and Remedies, organised by ICC Commercial Crime Bureau. International trading is highly competitive. Margins...2009-08-06
Worm attacks: enterprises need to remain on guard in 2004Hits:3
Last week, inboxes across the world have been flooded with the mass mailing worm MyDoom, with analysts and security experts touting this worm to be more destructive, costly and widespread than last year's SoBig virus. This is...2009-08-05
SCO offers $250,000 for the head of MyDoom's authorHits:5
The software company SCO has announced in a press release that it is offering a 250,000 reward for information leading to the successful arrest and conviction of the author of W32/MyDoom-A. The MyDoom worm has spread widely across the inte...2009-08-05

Home  <<Prev  1   2   3   4   5   6   7   8   9   10   11  Next>>  Last

Current Page:4 , Total 35 Pages, Every Page 15 Records, Total Records: 514

Hot Articles
Recommend Articles
New Articles
Sub category