About us | Advertising | SecurityWatch
Home   Articles   Blog   Reviews   Press Releases   Security Tools   Sponsored Solutions
Information Security | Storage | Wireless and Mobile | Editorials | IT Insight
Articles > Archive
A security researcher tried to sell a zero-day vulnerability in Microsoft’s Excel spreadsheet program on eBay. The auction site removed the listing on Thursday night, after the listing was bid to $60.
Friday, 9 December 2005 14:21 EST


When the latest variant of the Sober worm appeared online, anti-virus vendors were aware that the worm communicates with its author, but they did not know the exact way.
Friday, 9 December 2005 09:40 EST


Two Fixes Coming for Windows Flaws
As part of its monthly Patch Tuesday cycle, Microsoft gave advanced notice of updates it plans to release on Tuesday next week. The company will issue two security updates, with one deemed critical - Microsoft’s highest risk rating.
Friday, 9 December 2005 08:18 EST


Investing in a risk management process
Security risk management requires a proactive approach that can assist organisations of all sizes. A formal security risk management process enables enterprises to operate in the most cost efficient manner with a known and acceptable level of business risk.
Friday, 9 December 2005 07:27 EST


Instant messaging (IM) was never invited to the communications party in the enterprise - it crashed the party, and now IT managers are finding themselves in a position where they must find a way to control IM before the dining room table gets smashed.
Friday, 9 December 2005 05:00 EST


Executives are More Accountable for Information Security
Latest study from (ISC)2 shows that information security professionals are gaining influence in the board room. Management will spend more than 43 percent of its IT security budget on personnel, education and employee training.
Thursday, 8 December 2005 12:53 EST


Intel to develop hardware rootkit detection chip
Intel is trying to eliminate the human factor when dealing with root-kits detection by developing a new hardware-based technique to discover and notify users when they are downloading unintentionally a root-kit to their computer.
Thursday, 8 December 2005 11:07 EST


The Unspoken Taboo - The Never Expiring Password
A few months ago we installed a burglar alarm in our house. The company sent a trustworthy employee to do the installation, and he set the whole thing up for us.
Thursday, 8 December 2005 05:00 EST


Gov Pushing for Cell Tracking Without Probable Cause
The Electronic Frontier Foundation (EFF) has asked a federal judge in New York City to reject a Department of Justice request to track mobile phone users without probable cause of a crime.
Wednesday, 7 December 2005 13:21 EST


Vigilar Offers SOX, Internet Security Software Suite
Secure Blue announced today that it has singed partnership agreement with leading information security consulting firm Vigilar. Vigilar now offers Secure Blue’s Sarbanes-Oxley and Internet Network Security software suit to Vigilar clients.
Wednesday, 7 December 2005 11:08 EST


What's up, IT? Blog

Preventing and Surviving a Podjacking
Designer Worms and Viruses--Coming Soon to an Organization Near You
Rootkits storm malware chart
Protecting Applications From Hackers
Think your PC is safe online? Think again
FBI rules out cyber-attacks
Apple slammed for piracy-fuelling iPod
Sophos says Apple good security choice
Spyware Prevention: Effective Network Protection through Defense in Depth
Scan all company email for viruses, Trojans and worms with 4 virus engines, all in one package - GFI MailSecurity for Exchange/SMTP! Download your free 60-day trial today!

Check your website security with Acunetix Web Vulnerability Scanner. Audit your web applications for SQL injection, cross site scripting & more. Download trial!

Network Security Tools

Fiaif
FIAIF is an Intelligent Firewall. It provides a highly customizable script for setting up an iptables-based firewall.


GeSWall
With GeSWall, you can safely surf the web, open e-mail attachments, chat, exchange files etc, regardless of the security threats posed by the internet.


FourEyes
FourEyes allows network administrators to enforce a four eyes policy on Windows NT, 2000 and XP by requiring two users to authenticate during a local logon.




Press Releases

Apani Networks Joins The Open Group and OASIS to Augment Enterprise Network Security Initiatives
Green Armor Solutions Introduces Identity Cues Two Factor
Cyber-Ark Software Chooses IBM to Help Deliver On Demand Business Solutions to Meet Banking Industry Customer Needs

Copyright © IT-Observer.com 2000 - 2005    Privacy Policy | RSS Feeds
Site Meter