Monthly Archives: April 2006

GFI WebMonitor voted ISAserver.org Readers’ Choice Award Winner

GFI WebMonitor for ISA Server, which offers real-time HTTP/FTP monitoring, anti-virus and access control, was selected the winner in the Access Control category of the ISAserver.org Readers´ Choice Awards. The official award announcement was made today by leading ISA Server resource site via their ISAserver.org site.

Trojans, Trojans, Trojans!

In the last few years, we’ve seen an increase in the number of Trojans: they have now become the favourite weapon of malware authors. Unlike viruses, Trojans don’t have their own on-board replication capability. For this reason, they’re often perceived as being less dangerous than viruses or worms. Yet their effects can be dangerous and… Read More »

47 Million Computers Are Transformed Into Bots

Security experts at MicroWorld Technologies urges computer users around the world to take note of a recent study which revealed that a startling 47 million computers are transformed into botnets and zombies, controlled by many botmasters.

Mobile malware – it’s only the start

The next couple of years will see mobile security rise higher and higher up the security agenda. Initially, mobile malware was specifically aimed at smartphones. Cabir, the first worm for mobile phones, was discovered in June 2004 and threats aimed at smartphones have continued to appear, with several of them based on the source code… Read More »

A Proactive Approach to VoIP Security

The emergence of Voice-Over-IP (VoIP) technology is creating a major discontinuity in telecommunications. The promise of reduced hardware and operations costs coupled with new value-added services makes VoIP, as well as Internet Protocol(IP) TV, videoconferencing, IP Multimedia Subsystem (IMS) and presence services, a compelling solution for enterprises and service providers.

Theoretical Hacking for IT Managers

Not everyone has l33t skilz or mass amounts of hardened TCP/IP stack programming experience. When I´m at work, I don´t look at logs all day long, nor do I run security audits every five minutes. I do my job, which takes all of my time. This is the situation for most small to medium sized… Read More »

Anonymity and Privacy in Electronic Services

People increasingly use the Internet for an ever wider range of activities: reading the newspaper, shopping, staying in contact with family and friends, finding a partner, booking holidays, expressing their opinion, keeping an online diary, etc.

How to fix the top 10 Internet Explorer issues

Malware, the perennial enemy of the Web surfer, has received a lot of publicity and analysis over the past 12 months and rightly so, but this attention has, in some ways, proven to be a two-edged sword. It is easy to forget that issues with Internet Explorer are not always caused by malware, especially when… Read More »

Phishers Taking A Multilingual Approach

RSA Security announced today that over the past six months it has seen a considerable growth in the amount of phishing attacks targeting financial institutions in non-English speaking countries. Based on the data processed by RSA Security´s Anti-Fraud Command Centre, the portion of attacks targeting such countries now represents almost 40 percent of worldwide phishing… Read More »