Archive

Archive for April, 2006

GFI WebMonitor voted ISAserver.org Readers’ Choice Award Winner

April 28th, 2006
Comments Off on GFI WebMonitor voted ISAserver.org Readers’ Choice Award Winner

GFI WebMonitor for ISA Server, which offers real-time HTTP/FTP monitoring, anti-virus and access control, was selected the winner in the Access Control category of the ISAserver.org Readers´ Choice Awards. The official award announcement was made today by leading ISA Server resource site via their ISAserver.org site.
Read more…

Releases

1-Defender protects users against zero-day vulnerability in Microsoft Internet Explorer

April 28th, 2006
Comments Off on 1-Defender protects users against zero-day vulnerability in Microsoft Internet Explorer

AMUST Software today announced that its latest product, AMUST 1-Defender provides the most effective first line defense against the newest zero-day vulnerability in Microsoft Internet Explorer.
Read more…

Releases

Trojans, Trojans, Trojans!

April 28th, 2006
Comments Off on Trojans, Trojans, Trojans!

In the last few years, we’ve seen an increase in the number of Trojans: they have now become the favourite weapon of malware authors. Unlike viruses, Trojans don’t have their own on-board replication capability. For this reason, they’re often perceived as being less dangerous than viruses or worms. Yet their effects can be dangerous and very far-reaching, not only increasing in numbers, but in sophistication too. Consequently, they are being put to a growing number of malicious uses.
Read more…

Articles

47 Million Computers Are Transformed Into Bots

April 27th, 2006
Comments Off on 47 Million Computers Are Transformed Into Bots

Security experts at MicroWorld Technologies urges computer users around the world to take note of a recent study which revealed that a startling 47 million computers are transformed into botnets and zombies, controlled by many botmasters.
Read more…

News

Mobile malware – it’s only the start

April 27th, 2006
Comments Off on Mobile malware – it’s only the start

The next couple of years will see mobile security rise higher and higher up the security agenda. Initially, mobile malware was specifically aimed at smartphones. Cabir, the first worm for mobile phones, was discovered in June 2004 and threats aimed at smartphones have continued to appear, with several of them based on the source code for Cabir. The threats we’ve seen so far include a virus, worms and several Trojans: in other words, the same types of threat that have plagued PCs during the last 20 years.
Read more…

Articles

A Proactive Approach to VoIP Security

April 26th, 2006
Comments Off on A Proactive Approach to VoIP Security

The emergence of Voice-Over-IP (VoIP) technology is creating a major discontinuity in telecommunications. The promise of reduced hardware and operations costs coupled with new value-added services makes VoIP, as well as Internet Protocol(IP) TV, videoconferencing, IP Multimedia Subsystem (IMS) and presence services, a compelling solution for enterprises and service providers.
Read more…

Articles

Theoretical Hacking for IT Managers

April 26th, 2006
Comments Off on Theoretical Hacking for IT Managers

Not everyone has l33t skilz or mass amounts of hardened TCP/IP stack programming experience. When I´m at work, I don´t look at logs all day long, nor do I run security audits every five minutes. I do my job, which takes all of my time. This is the situation for most small to medium sized companies that have only a few IT guys. So how does an everyday IT guy handle the constant threat of impending attack?
Read more…

News

Anonymity and Privacy in Electronic Services

April 26th, 2006
Comments Off on Anonymity and Privacy in Electronic Services

People increasingly use the Internet for an ever wider range of activities: reading the newspaper, shopping, staying in contact with family and friends, finding a partner, booking holidays, expressing their opinion, keeping an online diary, etc.
Read more…

News

How to fix the top 10 Internet Explorer issues

April 26th, 2006
Comments Off on How to fix the top 10 Internet Explorer issues

Malware, the perennial enemy of the Web surfer, has received a lot of publicity and analysis over the past 12 months and rightly so, but this attention has, in some ways, proven to be a two-edged sword. It is easy to forget that issues with Internet Explorer are not always caused by malware, especially when the support groups are full of cries for help from owners of infected machines.
Read more…

Articles, News

Phishers Taking A Multilingual Approach

April 26th, 2006
Comments Off on Phishers Taking A Multilingual Approach

RSA Security announced today that over the past six months it has seen a considerable growth in the amount of phishing attacks targeting financial institutions in non-English speaking countries. Based on the data processed by RSA Security´s Anti-Fraud Command Centre, the portion of attacks targeting such countries now represents almost 40 percent of worldwide phishing targets.
Read more…

News