Archive

Archive for January, 2007

Vista, security and viruses

January 26th, 2007
Comments Off on Vista, security and viruses

Anti-virus software vendor Kaspersky Lab, has published an article about Windows Vista and security, in which it provides an analysis of various aspects of IT security with specific reference to Windows Vista.
Read more…

News

Windows Defender is weak

January 26th, 2007
Comments Off on Windows Defender is weak

Microsoft’s default malware blocking application and anti-virus programs may not fully protect Vista users, says security software vendor Webroot.
Read more…

News

Multiple Cisco IOS vulnerabilities

January 24th, 2007
Comments Off on Multiple Cisco IOS vulnerabilities

Cisco has announced three security bulletins regarding issues in the Cisco IOS software. Cisco IOS is the software used on the vast majority of Cisco routers and all Cisco network switches.
Read more…

News

Malware vs. virtual machines

January 24th, 2007
Comments Off on Malware vs. virtual machines

As virtual machines and various emulators have become commonplace in analysis of malicious code, malicious code has started to fight back. This hot topic was recently covered at AVAR 2006 conference by Peter Ferrie, a researcher at Symantec anti-virus research center.
Read more…

News

iSafe

January 23rd, 2007
Comments Off on iSafe

iSafe can keep your credit card numbers, bank account information, software serial numbers, web based usernames and passwords and more all in one convenient place. It conveniently stores all information in a encrypted format. Also you can safely type and encrypt text documents from within iSafe or encrypt documents that are already stored on your hard drive to prevent prying eyes from reading your personal information kept on your computer.

IT-Tools

New Bluetooth attack disables phones

January 22nd, 2007
Comments Off on New Bluetooth attack disables phones

Security researchers discovered a new technique to launch Denial-of-Service attack against mobile phones. The new DoS attack uses Bluetooth to flood the mobile device with OBEX push requests.
Read more…

News

Pegasus Technologies Innovative Use Of Cryptocard’s Authentication Tokens Saves Lower Colorado River Authority An Estimated 450 Worker Hours Per Year

January 20th, 2007
Comments Off on Pegasus Technologies Innovative Use Of Cryptocard’s Authentication Tokens Saves Lower Colorado River Authority An Estimated 450 Worker Hours Per Year

Pegasus Technologies, a leader in IT-based security solutions and services, is proud to announce that its innovative deployment of CRYPTOCard’s user-friendly two-factor authentication tokens has enabled Lower Colorado River Authority (LCRA) to positively identify field workers by phone during the critical Red Tagging process – instantly eliminating 60 percent of associated travel time. LCRA estimates this improved efficiency has saved 450 worker hours per year, which represents a project payback time of seven months.
Read more…

Releases

Fugu – Secure File Transfer

January 19th, 2007
Comments Off on Fugu – Secure File Transfer

Fugu is a graphical frontend to the commandline Secure File Transfer application (SFTP). SFTP is similar to FTP, but unlike FTP, the entire session is encrypted, meaning no passwords are sent in cleartext form, and is thus much less vulnerable to third-party interception. Read more…

IT-Tools

SafeBit Disk Encryption

January 17th, 2007
Comments Off on SafeBit Disk Encryption

A firewall or an antivirus program gives you protection from outside threats. But who protects your important files againts inside threats? What if your laptop is stolen, what if a hacker cracks your security system, what if a virus infects your computer, what if a trojan gets inside your system and sends out your top secret files? SafeBit is the last line of defense. It provides the internal and portable protection you need. Read more…

IT-Tools

EagleEyeOS One

January 17th, 2007
Comments Off on EagleEyeOS One

EagleEyeOS One suits everybody who does not require the extensive network systems that is typical of the enterprise segment, but they want to determine an access policy to handle the mobile devices (Floppy, CD, DVD, InfraRed, COM, LPT, USB, Bluetooth, Wireless, etc.) in order to protect the data and the proprietary interests. On the computer the mobile devices that could be in use to expropriate the information can be blocked or rather, the activities executed on them can be traced. The program sends alerts to a predefined e-mail address about the plugged and unplugged storages, additionally the file operations executed on the storages.

IT-Tools