Your are here:hacking technology > hacker invade > Article list

Home > hacker invade > Page 7
Two out of three wireless networks across UK and Ireland still open to hackersHits:2
An extensive survey conducted by Newell Budge Security across the UK and Ireland has revealed that 62% of firms using wireless technology are still failing to take the minimum precautions to secure their networks. One of the...07/14/2009
New virus disguised as Saddam Hussein death photographsHits:2
computer users should be careful of new worm posing as photographic evidence that Saddam Hussein has been killed following an attempted escape bid from custody. The Bobax-H worm spreads both via email and using a Microsoft security...07/13/2009
Watchfire launches online risk management platformHits:2
Watchfire has introduced Watchfire WebXM 4.0, the first online risk management platform to provide management of online security, privacy, accessibility, quality, and regulatory compliance issues. This release...07/13/2009
Why businesses need to manage and monitor employee email usageHits:2
In a few short years, email has become a major part of the national psyche and a business-critical tool of communication. However, while companies have been more than willing to embrace the business benefits of email, they continue...07/11/2009
Websense Launches Two New Web Security Suites for protection against phishing attacks, brand theft,Hits:17
Websense, Inc. has announced the release of two new integrated web security solutions. The Websense Web Security Suite provides advanced web security for mitigating spyware, malicious mobile code (MMC), phishing attacks, instant messaging ...07/11/2009
Zero-Day Attacks: The Threat is RealHits:2
Over the past few years, the visibility of a dangerous type of attack known as zero-day has increased. So has the confusion around what exactly constitutes such an attack. Fueled by the growing concerns of network security managers...07/10/2009
Forewarned Is ForearmedHits:2
As every enterprise knows, today s cyber threats are more sophisticated and dangerous than ever before. A quick look back at 2004 shows what we re up against: According to the Anti-Phishing Working Group, phishing attacks jumped by 28...07/10/2009
3G dream a security nightmareHits:2
Smart mobile technology is rapidly gaining in popularity and hackers and crackers are among its biggest fans! Very few consumers know about the vulnerabilities of 3G technology, and only now is the industry waking up...07/09/2009
The rise of the mobile workforce - security nightmare or security opportunity?Hits:4
Over the last decade blackberries, mobile phones, laptops, PDAs and a variety of other devices have become intrinsic to both our working and personal lives. It is impossible to imagine a life without them. Consumers and...07/09/2009
Stiffer Penalties for Hacking and DoS Attacks Will Protect UK Businesses from CybercrimeHits:2
All Party Internet Group (APIG) Chairman, Derek Wyatt MP, has filed Notice of a 10 Minute Rule Bill calling for amendments to the Computer Misuse Act (CMA) to specifically address the threat from denial-of-service (DoS) attacks. In the...07/08/2009
Is Your Network Public?Hits:1
If I were to wander into your offices, plug in my laptop and within minutes take control of your network infrastructure, would you be surprised? There s a backdoor into many large networks which few organisations seem to recognise or...07/08/2009
Patch Management – Why it pays to PushHits:4
You may have the best security implementation in the world, you might have a security policy that s a model for the industry, but one small oversight or one missed patch and your network can become vulnerable. Keeping track...07/07/2009
ID Theft costs the UK £1.3bn per yearHits:1
A quarter of UK adults have had their identity stolen or know somebody who's been a victim of ID fraud, costing the country an estimated 1.3 billion a year. One of the major reasons reported for the massive increase in this activity is the...07/07/2009
Stranger Danger: The Threat from Social EngineeringHits:1
Barricaded in by sophisticated IT security systems, it s easy to get complacent about security in the modern workplace. But each fortress is only as good as the gatekeeper and security infrastructures, and policies can be...07/06/2009
How to avoid getting caught by phishing scamsHits:3
Hardly a day goes by without some online news reference to phishing , sometimes also known as carding or brand spoofing . But what is it, how does it work and what are the effects? Phishing [a conscious misspelling of the word fishing ] is...07/06/2009

Home  <<Prev  2   3   4   5   6   7   8   9   10   11   12  Next>>  Last

Current Page:7 , Total 35 Pages, Every Page 15 Records, Total Records: 518

Hot Articles
Recommend Articles
New Articles
Sub category