Your are here:hacking technology > hacker course > Article list

Home > hacker course > Page 5
Doomjuice shows that viruses don't just spread by emailHits:7
A new worm called W32/Doomjuice-A travels via the internet looking to attack computers which are infected with the widespread W32/MyDoom-A worm. Unlike MyDoom, the Doomjuice worm does not travel by email. As part of its infection process...2009-08-04
Serious security vulnerability found in Microsoft WindowsHits:3
The vulnerability, which Microsoft has described as 'critical' and which affects computers running Windows NT, Windows 2000, Windows XP and Windows Server 2003, could allow a remote hacker to have direct access to a user's computer...2009-08-04
Symantec software bundled with Intel desktop motherboardsHits:2
Symantec Corp. has announced that it will help safeguard users of Intel desktop motherboards worldwide by providing Internet security checking and access to security protection through the new Intel Desktop Utilities solution. Users will...2009-07-31
Redstone locks in partners against crime for security launchHits:6
Redstone Communications has joined forces with leading security specialists to launch a complete portfolio of converged services that provide effective enterprise protection against threats to voice, data, Internet and building security....2009-07-31
AT&T intrusion alerting and firewall services help thwart cybersecurity attacksHits:3
According to Computer Economics in Carlsbad, Calif., the worldwide impact of cyber attacks has grown steadily from 3.3 billion in 1997 to an estimated 12 billion in 2003. As a result, protecting networks against malicious intruders and un...2009-07-30
SurferQuest protects business centers in hotelsHits:5
Most hotel guests now have access to the Internet to read and write e-mails, surf the Web for the latest news and they can work in Word, Power Point and Excel. Unfortunatly, the computers are often down, and furthermore, there have...2009-07-30
SmoothWall Introduces Low Cost Alternative to SSL VPNHits:218
SmoothWall Ltd has announced the availability of version 3.1 of SmoothTunnel, its Virtual Private Network (VPN) Gateway. The new module includes support for Layer 2 Tunnelling Protocol (L2TP). Combined with SmoothWall s L2TP Wizard for...2009-07-29
Why Perimeter Security Alone is not EnoughHits:2
The focus for many IT Directors over the past few years has been combating the cyber-security threats reported by the media on an almost daily basis. Horror stories of hackers and virus writers have had organisations in a spin, and...2009-07-29
Employees create business risks by ignoring Internet use policiesHits:2
According to Blue Coat(tm) Systems, employees continue to create security, legal and productivity risks for today's businesses through uncontrolled use of instant messaging (IM) and peer-to-peer (P2P) file sharing in the workplace....2009-07-28
Is the UK government computer crime initiative already hamstrung?Hits:1
The UK's efforts to tackle computer crime will be hamstrung by inability to convict even local hackers, NTA Monitor warned following the start of the UK's Computer Misuse Act review to prevent computer crime. Computer crime can't...2009-07-28
Homefirst chooses Sygate to secure its corporate networkHits:1
Homefirst, the largest Health Social Services community trust in Northern Ireland, has chosen the Sygate Secure Enterprise (SSE) solution to protect all devices attached to its corporate network. The health sector has an obvious...2009-07-28
Security budgets fail to keep pace with the increasing security threatHits:1
New research released by Securicor Security highlights a growing disparity between increasing security threats and the money spent by businesses to counteract them. According to the survey, 88 per cent of respondents believe the security...2009-07-27
Illicit software steals up to one third of charity funds raised onlineHits:2
The average infected user has 2-3 spyware programs installed without their knowledge, and the worst case surveyed had 25 illicit programs running on their machine. The software, which is usually installed alongside free...2009-07-27
205 Bristol businesses hacked in 45 minutesHits:1
A survey designed to identify as many unsecured wireless IT networks as possible within one hour, has uncovered potentially damaging vulnerabilities in many Bristol companies. The survey, conducted by security experts armed with just a...2009-07-25
New Microsoft internet vulnerabilitiesHits:1
Ubizen's security intelligence lab (SIL) is warning against three new vulnerabilities that have been discovered in the latest fully patched version of Microsoft Internet Explorer (IE). Two of the vulnerabilities mean that users...2009-07-25

Home  <<Prev  1   2   3   4   5   6   7   8   9   10   11  Next>>  Last

Current Page:5 , Total 35 Pages, Every Page 15 Records, Total Records: 514

Hot Articles
Recommend Articles
New Articles
Sub category