VoIP Articles -
New to VoIP? VoIP Articles will help you understand what's important in VoIP.
|
Editorials Archive
-
Media Player Encryption was hacked
Norwegian hacker, DVD Jon, has reverse engineered a proprietary algorithm used in Microsoft’s Windows Media Player to protect media content from hackers, opening up content broadcasting for multiple platforms and device.
-
Sony’s PlayStation Portable is Hackers Heaven
The announcement of PlayStation Portable for most people means a new cool gaming device, but with computer hackers the story is a bit different. Hackers have already managed to turn it inside out and figure out how to do things with them that Sony never intended.
-
Microsoft Anti-Phishing Tool to Detect Identity Theft
Microsoft will soon offer the general public the next generation of its anti-phishing tool. The new tool will try to help fighting identity-theft attacks using enhanced phishing scanner that will warn users about phishing attacks that could lead to identity theft attacks.
-
CipherTrust Stops Spam at the Network Edge
CipherTrust is breaking out of the firewall with a new appliance that will stop over 50 percent of unwanted traffic at the network edge before it reaches the firewall, thus acting as buffer between the internet and the corporate email gateway.
-
Zotob Authors were arrested in Europe by FBI
Local law-enforcement authorities of Morocco and Turkey, in co-operation with the FBI, have arrested two people on charges of creating and unleashing the worm. Microsoft Internet Crime Team worked closely with the law agencies to provide technical support during the investigation.
-
Intel Unveils Auto-Worm Detector
Intel has demonstrated at Intel Developer Forum a new hardware solution design to deal with computers infected with computer worms. The solution support automatically to detect infected computers by monitoring the network activity and isolate them.
-
Intel to Prevent Unauthorized Access to Wi-Fi
Intel is developing a new technology that could prevent unauthorized access to wireless networks using the time it takes for packets to arrive from the access point to the Wi-Fi user. This is one of several ideas were presented at Intel Developer Forum.
-
Cisco, Intel to Enhance Wireless
Cisco Systems and Intel announced an expansion of the existing partnership to enrich their commitment to Wireless and deliver new capabilities that enhance wireless networks, enable high-quality services and security for businesses.
-
Businesses Ignoring Email Security Risk
Businesses are ignoring an obvious security flaw in their outbound email management policies, according to findings of a new research. More than half of businesses do not take any actions to protect against improper sending of confidential emails.
-
Spam, Viruses Tops IT Security Concerns
Small and medium sized enterprises in 2005 are most concerned of spam and virus attacks and are prepared to spend as needed to bolster their protection, according to findings of a study examined top IT security fears among small businesses.
Previous ::
Next
|
Wednesday, September 14, 2005
Network Security
· |
Mobile fraudsters sentenced |
· |
Why not use hashes for the Anti-Phishing Filter? |
· |
Security: Picking on PHP |
· |
Check Point eases security update steps |
Wireless Security
Press Releases
· |
Novell Increases Security for the Open Enterprise |
· |
TANDBERG Expressway(TM) Becomes the Standard for NAT-Firewall Traversal Worldwide |
· |
Lockdown Networks Unveils Switch-Level Network Access Control |
· |
Narus Partners with Giza Systems to Provide Unified IP Management and Security Solution to Middle East |
|