Your are here:hacking technology > hacker invade > Article list

Home > hacker invade > Page 11
Is your site being hacked without your knowledge?Hits:1
Hackers manage to successfully break into systems much more often than you might realise. Just ask any member of a penetration testing team. These people hack for a living, with the explicit permission of the companies whose systems they...2009-06-01
When it comes to security, it takes twoHits:2
For many companies considering implementing network security for their business, it is often the case they just consider using one firewall to protect their network and precious data. This can be a short-sighted view if the information...2009-06-01
Social media cannot be ignored by IT security professionalsHits:2
A recent survey of IT professionals revealed surprising trends in individual and corporate use of social media. The Launchpad Europe IT Security Index 2009 was intended to gauge IT professionals attitudes towards social media, as well as...2009-05-31
Companies fail to take precautions to secure the weakest link in their information infrastructure -Hits:1
Recent well documented stories in the media have shown how easy it is to cause breaches in security by careless handling of paper documents. IT managers need to understand that not all attacks are malicious, and employees can inadvertently...2009-05-31
Moving your Malware strategy out of the dark agesHits:1
Since the mid 1980s the terms computer virus and worm have been synonymous with malicious code attacks. Through the years our working technological environment has dramatically changed, as has the scope of malicious code attacks. Yet...2009-05-27
Unprotected networks – a serious danger to your businessHits:1
Recent reports indicate that most significant corporate risks relating to information security breaches come from the internal network and are often initiated by disgruntled employees. Companies are putting themselves at unnecessary risk...2009-05-27
Not a patch on the new breed of cyber-criminalHits:1
The cyber-criminal is getting smarter and more organised and alongside this as have their methods of attack. Whereas 2 years ago the watchword was computer viruses, now new and infinitely more advanced attack methods exist. New and unknown...2009-05-26
Security policies must evolve to reflect growing IP mobilityHits:1
As mobility becomes an increasing part of modern business, organisations are failing to keep up with the security implications that come with it. Company data is being put at risk by IT managers not updating their security policies...2009-05-26
Extract value from compliance by concentrating on the broader security goalsHits:2
In recent months company directors have been continually reminded that a failure to comply with new regulations can and will land them in prison. Under regulations such as Sarbanes-Oxley, non-compliance can result in personal liability...2009-05-25
Majority believes that British hackers should have received harsher sentenceHits:3
A web poll conducted by Sophos has revealed that 86% believe the British virus writers, who were jailed last Friday, should have been dealt a harsher sentence by the authorities. Only 3% of respondents believed that the sentence given by...2009-05-25
Websense's Web Security Trends Report Finds Marked Increase in Crimeware and Malicious WebsitesHits:2
Websense, Inc. has released its 2005 Semi-Annual Web Security Trends Report. According to the report, the web continued to evolve and grow as an attack vector in the first half of 2005. The report found a marked increase in the number of...2009-05-23
Websense's Web Security Trends Report Finds Marked Increase in Crimeware and Malicious WebsitesHits:1
Websense, Inc. has released its 2005 Semi-Annual Web Security Trends Report. According to the report, the web continued to evolve and grow as an attack vector in the first half of 2005. The report found a marked increase in the number of...2009-05-23
LogLogic helps organisations improve compliance, security and efficiency by collecting and analysingHits:1
LogLogic has announced the availability of LogLogic 3, enabling organisations to collect, alert, store and report on machine data that manifests itself in logs. LogLogic 3 delivers intelligence to network operators and IT managers in...2009-05-23
Virus writers aim for Skype usersHits:3
Virus writers are targeting Skype users with a new Trojan that poses as the latest version of the popular VoIP software. Net security firm MessageLabs claims it has detected and blocked more than 800 copies of a new variant of the MyTob ...2009-05-22
Kaspersky Lab identifies malware and cyber threat evolutionHits:1
The third quarter of 2005 brought some important events which will undoubtedly have a significant influence on the information security industry in the coming months. The end of the summer is traditionally a period of high virus activity...2009-05-22

Home  <<Prev  6   7   8   9   10   11   12   13   14   15   16  Next>>  Last

Current Page:11 , Total 35 Pages, Every Page 15 Records, Total Records: 518

Hot Articles
Recommend Articles
New Articles
Sub category