Redknee Inc., a leading provider of innovative infrastructure software that monetises and personalises services and content for mobile users, today announced the general availability of its Unified Profile Server (UPS) for mobile network operators worldwide. UPS protects privacy concerns, allowing users to retain control over their wireless identity and have a higher comfort level with… Read More »
By familiarizing yourself with following software, you will not only have a better understanding of the vulnerabilities inherent in 802.11 networks, but you will also get a glimpse at how a hacker might exploit them. These tools can even be used when auditing your own network as we will see later.
GFI has announced that GFI EndPointSecurity has now gone live. GFI´s endpoint security solution provides IT administrators with granular, network-wide controls for portable storage devices, removable media and a wide range of consumer electronic devices.
Digital rights management (DRM) technology has deep flaws despite the hope of content providers that encrypted files will deter illegal file sharing, a computer security researcher said Monday. DRM is a catch-all term for a variety of methods used to limit content sharing.
In this interview Joanna Rutkowska, and independent security researcher, discusses malware stealth techniques and its security ramifications. Joanna is focusing on discovering new infection techniques, as well as methods to protect against them.
StillSecure, provider of an award- winning, integrated suite of enterprise network security solutions, today announced that StillSecure Strata Guard Free, the company’s freeware IDS/IPS, is available as a VMware virtual appliance. End users can now access the pre-built, pre-configured and ready-to-run version of Strata Guard Free for Linux environments.
For almost two years, intelligence services around the world tried to uncover the identity of an Internet hacker who had become a key conduit for al-Qaeda. The savvy, English-speaking, presumably young webmaster taunted his pursuers, calling himself Irhabi — Terrorist — 007. He hacked into American university computers, propagandized for the Iraq insurgents led by… Read More »
Just for the sake of clarity, there is an email attachment vector for this exploit that´s not widely reported. I have not seen any reports of it being used at this time. MS´s bulletin, in the FAQ´s, in Could this vulnerability be exploited through e-mail?, says it can be exploited if one open(s) an attachment… Read More »
Unipalm, the UK and Ireland´s specialist distributor of secure e-business solutions, has been selected by Symantec as a value added distributor for endpoint security solutions and its behaviour-based intrusion prevention technology.
Citrix Systems, Inc. (Nasdaq:CTXS), the global leader in access infrastructure solutions, announced today a marketing alliance with Sage Software, the leading provider of business management software and services to small and mid-sized business (SMBs) customers in North America. Sage Software is offering Citrix(R) GoToMyPC(R) remote access service and Citrix GoToMeeting(TM) web-conferencing service to Sage MAS… Read More »