Your are here:hacking technology > hacker course > Article list

Home > hacker course > Page 9
Top Layer’s IPS 5500 Prevents the Latest Identity Theft Cyber Crimes by Thwarting DNS Cache PoisoniHits:1
Top Layer Networks has announced that its Attack Mitigator IPS 5500 can be used by service providers to proactively protect their customers from a new scam that uses DNS Cache Poisoning to cheat innocent Internet users. This new type...06/23/2009
Two out of Three UK Company Networks Hit by SpywareHits:4
A new survey of 500 UK IT departments by SurfControl plc has found 62% of networks are known to have been infected by spyware. More than one in eight of the IT directors, CIOs and managers that participated were unable to...06/23/2009
Cybercrime WarsHits:1
In the ethereal world of the Internet, an underground crime war is being silently waged between the cyber-criminals and those trying to stop them. A war that is undermining the interests of...06/22/2009
THE BOTNET THREAT – AND HOW TO DEAL A BLOW BACK TO THE SPAMMERSHits:2
There was a time when the popular perception of virus writers and hackers was of male teenagers, beavering away at PCs in their bedrooms, intent on gaining notoriety for their exploits. Their behaviour was more mischievous than malicious...06/22/2009
Eicon Networks partners with F-SecureHits:1
Eicon Networks Corporation ( Eicon ) has entered into a License Agreement with F-Secure Corporation. Through this agreement, Eicon is able to bundle F-Secure s Linux Anti-Virus for Server and Gateway and resell F-Secure s Anti-Virus Client...06/20/2009
Websense Launches Web and Desktop Security Products with Removable Media LockdownHits:4
Websense, Inc. has announced the release of the latest versions of Websense Client Policy Manager(tm) (CPM) and Websense Web Security Suite(tm)-Lockdown Edition(tm), that provide security for employees using removable devices for...06/20/2009
40% of IT managers would rather get ill by catching a virus themselves than have networks infectedHits:1
The true extent of virus fear was recently demonstrated when nearly 40% of those questioned admitted they would rather get ill by contracting a virus themselves, than have one breach their network defences, according to the poll of 100...06/19/2009
Royal Mail partner with QinetiQ to deliver e-commerce infrastructure securityHits:5
The Royal Mail has awarded a major IT security contract to QinetiQ. A vulnerability scanning service has been established to protect the e-commerce infrastructure that supports Royal Mail UK, Post Office Ltd and Parcelforce. QinetiQ will...06/19/2009
DDoS: don’t get stuck in denialHits:2
Companies have long realised the great business opportunities that the Internet offers and it s no secret that organisations are shifting more and more of their business processes online. While this move brings many advantages with it,...06/18/2009
NTA Monitor launches wireless infrastructure testing serviceHits:2
Many organisations deploy wireless technology without any form of security testing and potentially expose both confidential information and internal systems to attack. The problem to date has been that by their very nature,...06/18/2009
Services providers and network operators join Arbor Networks' Fingerprint Sharing Alliance to gang uHits:3
Arbor Networks has established the Fingerprint Sharing Alliance, an alliance to help service providers and network operators share Internet attack information in real-time. The first of its kind in the security world, members can share...06/17/2009
Mobile Phone Hack AttackHits:6
Organisations transacting with their users over mobile phone applications could find themselves the victim of hack attacks, according to SecureTest. SecureTest has demonstrated that hackers can break into a mobile phone application, modify...06/16/2009
The Diary of a Penetration TesterHits:2
Foreign hackers, weak passwords, backdoors and buffer overflows just another day at the office for Network Defence's penetration testers. Here's a look at sample pages from the head tester's diary and what companies can learn...06/16/2009
Tesco Internet Access chooses F-Secure for subscriber anti-virus and Internet security solutionsHits:2
Tesco Internet Access is licensing F-Secure s Internet Security 2005 product to offer a comprehensive security solution for their Internet service subscribers, stopping viruses, spam and hacking, and giving parental control...06/15/2009
PC Guardian gains 4-star rating for its notebook security, desktop security and drive access controlHits:3
Notebook theft is a growing problem. Although recent figures for the UK are unavailable, the 2004 CSI/FBI PC crime and security survey in the US found that notebook theft is the second most prevalent crime, after virus-related problems...06/15/2009

Home  <<Prev  4   5   6   7   8   9   10   11   12   13   14  Next>>  Last

Current Page:9 , Total 35 Pages, Every Page 15 Records, Total Records: 514

Hot Articles
Recommend Articles
New Articles
Sub category