About us | Advertising | SecurityWatch
Home   Articles   Blog   Reviews   Press Releases   Security Tools   Sponsored Solutions
What's up IT? > Archive
How to Improve on Wireless Security
Elmer Fudd has been trying to keep that ''wascally wabbit'' Bugs Bunny out of his carrot patch since before Remington Rand built the first UNIVAC. But, when you start talking about how to keep those wascally hackers out of your wi-fi network, you'll soon find yourself sounding like Mr. Fudd himself.
Thursday, 12 January 2006 09:51 EST


WLANs Enter Integration Age
Activate a wireless LAN and here's a small sample of the potential fun that awaits you: de-authorization message floods, denial-of-service attacks, and rogue access points (APs).
Thursday, 12 January 2006 09:45 EST


Homeland Security helps secure open-source code
The U.S. Department of Homeland Security is extending the scope of its protection to open-source software.
Wednesday, 11 January 2006 13:40 EST


Qualys vulnerability research put in peril
Security management vendor Qualys has denied that its innovative Laws of Vulnerability research has been jeopardised by the sudden departure of its key instigator, Gerhard Eschelbeck.
Wednesday, 11 January 2006 13:39 EST


Microsoft Plugs 'Critical' E-Mail Server Holes
Microsoft Corp. on Tuesday released two security bulletins to fix "critical" flaws in several widely deployed products, including one that presents a remote unauthenticated attack vector that could leave corporate e-mail servers open to a destructive network worm attack.
Wednesday, 11 January 2006 13:38 EST


Phishing By The Numbers: 41,000 Blocked Sites in 2005
The Netcraft Toolbar has blocked more than 41,000 confirmed phishing URLs since its launch last Dec. 28. The volume of URLs increased throughout the year, from about 3,000 per month in June to 5,000-plus in September and more than 8,000 in October and November. With a year's worth of data in hand, an analysis of attacks illustrates common patterns and practices in the operation of phishing scams.
Tuesday, 3 January 2006 11:19 EST


Top 7 PHP Security Blunders
PHP is a terrific language for the rapid development of dynamic Websites. It also has many features that are friendly to beginning programmers, such as the fact that it doesn't require variable declarations. However, many of these features can lead a programmer inadvertently to allow security holes to creep into a Web application. The popular security mailing lists teem with notes of flaws identified in PHP applications, but PHP can be as secure as any other language once you understand the basic types of flaws PHP applications tend to exhibit.
Friday, 23 December 2005 09:29 EST


The human factor and information security
This article has not been written in order to scare users, or to push them into buying security software for their computers. It's simply an attempt to share some thoughts which have come to mind in my work as a virus analyst, while analysing code, reading a range of forums and articles, and numerous daily messages from readers asking for help.
Friday, 23 December 2005 09:28 EST


Why I Love Vulnerability Analysis In 2005
Walk into the data center with my escort. Look at appliance. "No, you can't have a login to the box". "No, you can't generate any packets and look at the responses; these are hooked up to production servers". I've got professional liability insurance, but it's probably best not to exercise it. Mope briefly.
Friday, 23 December 2005 09:27 EST


IT security fear factor: Tape backups
In the television show "Fear Factor," people do foolish things for money. While the stunts are ultimately harmless, one may question whether eating worms or sticking one's head in lard for a cash reward is worth it.
Friday, 23 December 2005 09:24 EST


Next

Featured Articles

The future of voice communications, much like most everything else, is going with some type of Internet Protocol (IP) implementation. In voice communications, this technology is called Voice over IP or VoIP.

Meetinghouse has announced the availability of AEGIS SecureConnect 4.0 for endpoint security. AEGIS SecureConnect allows enterprises to configure, deploy, and manage their endpoint security to combat wireless and wired network threats that affect data and network integrity.

IT Professionals as Full Business Partners
In the last few months much has been written about IT Professionals expanding their business expertise in order to participate as full business partners in their respective organizations. Acquiring a basic understanding of other business disciplines such as finance, operations, marketing & sales, logistics and strategic planning have all been mentioned as advantageous credentials.

Scan all company email for viruses, Trojans and worms with 4 virus engines, all in one package - GFI MailSecurity for Exchange/SMTP! Download your free 60-day trial today!

Check your website security with Acunetix Web Vulnerability Scanner. Audit your web applications for SQL injection, cross site scripting & more. Download trial!

Network Security Tools

SpyDefense
SpyDefense protects your computer against annoying, and harmful software such as Spyware, Adware, Trojan horses, etc. SpyDefense is anti-spyware software that prides itself on a very user friendly environment.


Proactive Security Auditor
Proactive Password Auditor is a password security test tool that's designed to allow Windows NT, Windows 2000, Windows XP and and Windows Server 2003-based systems administrators to identify and close security holes in their networks.


File Securer
File Securer is a powerful tool designed to protect your sensitive folder and personal file. With strong security, File Securer embeds the protect into windows system kernel, both on command mode and window mode, all work professionally.




Press Releases

Comodo Provides Free Identity and Trust Assurance Security Suite to Charities and Not for Profit Organizations
Sonicwall Keeps Users Secure From Wmf Remote Code Execution Exploit
Lufthansa Systems implements PKWARE’s Cross-Platform SecureZIP Solutions to Protect Information Exchanged with its Business Partners
ISS Protects Customers Against Microsoft TNEF Vulnerability

Copyright © IT-Observer.com 2000 - 2006    Privacy Policy | RSS Feeds
Site Meter