|
Two out of three wireless networks across UK and Ireland still open to hackers | Hits:2 |
An extensive survey conducted by Newell Budge Security across the UK and Ireland has revealed that 62% of firms using wireless technology are still failing to take the minimum precautions to secure their networks. One of the... | 07/14/2009 |
New virus disguised as Saddam Hussein death photographs | Hits:2 |
computer users should be careful of new worm posing as photographic evidence that Saddam Hussein has been killed following an attempted escape bid from custody. The Bobax-H worm spreads both via email and using a Microsoft security... | 07/13/2009 |
Watchfire launches online risk management platform | Hits:2 |
Watchfire has introduced Watchfire WebXM 4.0, the first online risk management platform to provide management of online security, privacy, accessibility, quality, and regulatory compliance issues. This release... | 07/13/2009 |
Why businesses need to manage and monitor employee email usage | Hits:2 |
In a few short years, email has become a major part of the national psyche and a business-critical tool of communication. However, while companies have been more than willing to embrace the business benefits of email, they continue... | 07/11/2009 |
Websense Launches Two New Web Security Suites for protection against phishing attacks, brand theft, | Hits:17 |
Websense, Inc. has announced the release of two new integrated web security solutions. The Websense Web Security Suite provides advanced web security for mitigating spyware, malicious mobile code (MMC), phishing attacks, instant messaging ... | 07/11/2009 |
Zero-Day Attacks: The Threat is Real | Hits:2 |
Over the past few years, the visibility of a dangerous type of attack known as zero-day has increased. So has the confusion around what exactly constitutes such an attack. Fueled by the growing concerns of network security managers... | 07/10/2009 |
Forewarned Is Forearmed | Hits:2 |
As every enterprise knows, today s cyber threats are more sophisticated and dangerous than ever before. A quick look back at 2004 shows what we re up against: According to the Anti-Phishing Working Group, phishing attacks jumped by 28... | 07/10/2009 |
3G dream a security nightmare | Hits:2 |
Smart mobile technology is rapidly gaining in popularity and hackers and crackers are among its biggest fans! Very few consumers know about the vulnerabilities of 3G technology, and only now is the industry waking up... | 07/09/2009 |
The rise of the mobile workforce - security nightmare or security opportunity? | Hits:4 |
Over the last decade blackberries, mobile phones, laptops, PDAs and a variety of other devices have become intrinsic to both our working and personal lives. It is impossible to imagine a life without them. Consumers and... | 07/09/2009 |
Stiffer Penalties for Hacking and DoS Attacks Will Protect UK Businesses from Cybercrime | Hits:2 |
All Party Internet Group (APIG) Chairman, Derek Wyatt MP, has filed Notice of a 10 Minute Rule Bill calling for amendments to the Computer Misuse Act (CMA) to specifically address the threat from denial-of-service (DoS) attacks. In the... | 07/08/2009 |
Is Your Network Public? | Hits:1 |
If I were to wander into your offices, plug in my laptop and within minutes take control of your network infrastructure, would you be surprised? There s a backdoor into many large networks which few organisations seem to recognise or... | 07/08/2009 |
Patch Management – Why it pays to Push | Hits:4 |
You may have the best security implementation in the world, you might have a security policy that s a model for the industry, but one small oversight or one missed patch and your network can become vulnerable. Keeping track... | 07/07/2009 |
ID Theft costs the UK £1.3bn per year | Hits:1 |
A quarter of UK adults have had their identity stolen or know somebody who's been a victim of ID fraud, costing the country an estimated 1.3 billion a year. One of the major reasons reported for the massive increase in this activity is the... | 07/07/2009 |
Stranger Danger: The Threat from Social Engineering | Hits:1 |
Barricaded in by sophisticated IT security systems, it s easy to get complacent about security in the modern workplace. But each fortress is only as good as the gatekeeper and security infrastructures, and policies can be... | 07/06/2009 |
How to avoid getting caught by phishing scams | Hits:3 |
Hardly a day goes by without some online news reference to phishing , sometimes also known as carding or brand spoofing . But what is it, how does it work and what are the effects? Phishing [a conscious misspelling of the word fishing ] is... | 07/06/2009 |
|