Your are here:hacking technology > hacker course > Article list

Home > hacker course > Page 7
Microsoft issues critical security patch against Bofra bugHits:5
Companies and home users are urged to ensure they are protected against a security hole found in Microsoft Internet Explorer, which has already been exploited by an internet worm. The vulnerability - known various as the Internet...07/16/2009
Check Point Secures Communications for City and Hackney Teaching Primary Care TrustHits:4
Check Point Software Technologies Ltd. has announced that City and Hackney Teaching Primary Care Trust (City and Hackney TPCT) has standardised on Check Point's intelligent VPN-1 Pro(tm) solution to secure its communications infrastructure...07/16/2009
One in every ten emails infected by Christmas card virusHits:4
The Zafi-D worm (W32/Zafi-D), which was discovered on Tuesday posing as a Christmas greeting, has continued to cause problems for unprotected computer users. The virus is currently accounting for 72% of all virus reports in the last 24...07/15/2009
Aladdin Announces General Availability of eToken Simple Sign-On (SSO)Hits:8
With the growing number of applications and electronic resources used in organisations, passwords often create significant costs and security issues for those organisations. Users managing multiple passwords typically write them down...07/15/2009
Security threat emerges as thousands of mobile devices left in taxisHits:7
Businesses and individuals are being urged to use the password and encryption facilities available on the recent crop of high memory capacity mobile smartphones, in order to protect the sensitive information held on them. This advice comes...07/14/2009
Trojan steals usernames and passwords for fantasy role-playing gameHits:7
A new Trojan horse, LegMir-Y, is designed to steal usernames and passwords from players of a massive multi-player online role-playing game, Lineage . Lineage is a medieval themed fantasy game played over the internet and claims to have...07/14/2009
Email virus pulls a funny faceHits:5
A new worm demonstrates the ancient British art of gurning, the tradition of pulling a funny or scary face, as it infects computers with a backdoor Trojan. The Wurmark-F worm spreads via email, pretending to be from addresses such as...07/13/2009
90% of remote access VPN systems have exploitable vulnerabilitiesHits:7
Over a three-year period of testing VPNs, NTA Monitor has discovered that 90% of remote access VPN systems have exploitable vulnerabilities. The tests were mainly carried out for large organisations, including financial institutions that...07/13/2009
Pointsec partners with i-mate to offer secure mobile devicesHits:10
Protecting mobile devices from hackers, theft or loss due to sheer forgetfulness, and the potential security breach that comes with jeopardized data, is a very real threat that plagues the mobile industry. i-mate have launched a security...07/11/2009
CipherTrust introduces new IronMail models for small and medium enterprisesHits:15
CipherTrust has announced that the IronMail appliance is available for companies with 1,000 employees or less. Available in four models, the IronMail S-class offers the same industry-leading technology as the enterprise-class...07/11/2009
American Megatrends and Ancora Technologies Announce Strategic Alliance to Offer BIOS Based SecurityHits:11
The recent phishing attacks on online banking accounts highlight the need for an effective yet convenient 2nd factor authentication in addition to a password. Ancora Online provides consumer strong authentication that enables consumers...07/10/2009
Locks only keep the honest people outHits:7
It's a maxim that applies as much to network security as it does to protecting physical assets because there are many ways for a determined individual to penetrate a perimeter defense. Some threats like the Sobig virus instantly threatened...07/10/2009
Open Source For Perimeter Security: Two Projects Provide AnswersHits:6
There is a widespread and wholly inaccurate impression that open source development is somehow haphazard and undisciplined, a free-for-all among brilliant but uncoordinated individuals. In fact, most major open source projects are very...07/09/2009
Enterasys Secure Networks Helps Hyundai UK Manage IT ChallengesHits:9
Enterasys Networks (NYSE: ETS) has announced that Hyundai Cars in the UK has deployed Secure Networks(tm) solutions to provide a secure, scaleable, resilient infrastructure for its UK headquarters. The Korean automotive manufacturer also...07/09/2009
Telecom Fraud: The Cost of Doing Nothing Just Went UpHits:8
In today's business environment, IT network security is vitally important, with security breaches across voice and data networks growing by the day. Emotive terms such as cyber attack and cyber-terrorism are always certain to...07/08/2009

Home  <<Prev  2   3   4   5   6   7   8   9   10   11   12  Next>>  Last

Current Page:7 , Total 35 Pages, Every Page 15 Records, Total Records: 514

Hot Articles
Recommend Articles
New Articles
Sub category