contact contact contact
ÊAdvertise
ÊContact
ÊSecurityWatch
Ê Articles | Editorials | Reviews | News | InfoSec Directory | Releases | Submit PR

GFI MailArchiver for Exchange - Easily archive Exchange Server mail & comply with Sarbanes Oxley - Free evaluation available.

Network Security Software - Sponsored by GFI Network Security.

Free VoIP Assessment for your business
Zombie machines used in 'brutal' SSH attacks
Friday, 03 June 2005, 09:06 GMT

It's a tedious activity that can put the best of IT administrators to sleep. But as security and compliance manager for a large U.S. healthcare organization, Adam Nunn has learned to study his network activity logs religiously. He knows that when the bad guys work overtime to break his defenses, those logs can be the first sign of trouble.

He had a more relaxed approach to log checking at home. But one day he had a look and was alarmed to find that more than 1,000 brute force attacks had been targeting his personal Web server for a month.

Read More at Search Security

Back to main page


Sunday, June 12, 2005

Network Security

Code Signing: Is it a Security Feature?
What to ask when evaluating intrusion-prevention systems
Two-thirds of firms have insufficient password security
A Role Model for Security. Almost.

Wireless Security

Quantum cryptography network gets wireless link
Microsoft lets your IT manager wipe your phone
New hack cracks 'secure' Bluetooth devices
Evil Twins a Menace to Wireless Security

InfoSec Directory

The Battle Against Phishing: Dynamic Security Skins
Toward SSL Integration in SIM SmartCards
Phishing attacks and countermeasures
Overview of image security techniques with applications in multimedia systems


Free VoIP Assessment for your business


Press Releases

Elemental Selected to Present at the 15th Annual Computer Security Institute NETSEC 2005 Conference
Diversinet’s Mobile, Internet And Security Triple Play Scores Big In Profit 100
Upgraded Protection for Microsoft Exchange Server 2000/2003
New trends from Japan: Mobile phones become media terminals, credit cards and remote controls
ÊCopyright © 2000 - 2005 eBCVG IT Security Affiliates :: RSS feeds :: PrivacyÊ
Site Meter

Ê