Anti-virus software vendor Kaspersky Lab, has published an article about Windows Vista and security, in which it provides an analysis of various aspects of IT security with specific reference to Windows Vista.
Microsoft’s default malware blocking application and anti-virus programs may not fully protect Vista users, says security software vendor Webroot.
Cisco has announced three security bulletins regarding issues in the Cisco IOS software. Cisco IOS is the software used on the vast majority of Cisco routers and all Cisco network switches.
As virtual machines and various emulators have become commonplace in analysis of malicious code, malicious code has started to fight back. This hot topic was recently covered at AVAR 2006 conference by Peter Ferrie, a researcher at Symantec anti-virus research center.
iSafe can keep your credit card numbers, bank account information, software serial numbers, web based usernames and passwords and more all in one convenient place. It conveniently stores all information in a encrypted format. Also you can safely type and encrypt text documents from within iSafe or encrypt documents that are already stored on your… Read More »
Security researchers discovered a new technique to launch Denial-of-Service attack against mobile phones. The new DoS attack uses Bluetooth to flood the mobile device with OBEX push requests.
Pegasus Technologies, a leader in IT-based security solutions and services, is proud to announce that its innovative deployment of CRYPTOCard’s user-friendly two-factor authentication tokens has enabled Lower Colorado River Authority (LCRA) to positively identify field workers by phone during the critical Red Tagging process – instantly eliminating 60 percent of associated travel time. LCRA estimates… Read More »
Fugu is a graphical frontend to the commandline Secure File Transfer application (SFTP). SFTP is similar to FTP, but unlike FTP, the entire session is encrypted, meaning no passwords are sent in cleartext form, and is thus much less vulnerable to third-party interception.
A firewall or an antivirus program gives you protection from outside threats. But who protects your important files againts inside threats? What if your laptop is stolen, what if a hacker cracks your security system, what if a virus infects your computer, what if a trojan gets inside your system and sends out your top… Read More »
EagleEyeOS One suits everybody who does not require the extensive network systems that is typical of the enterprise segment, but they want to determine an access policy to handle the mobile devices (Floppy, CD, DVD, InfraRed, COM, LPT, USB, Bluetooth, Wireless, etc.) in order to protect the data and the proprietary interests. On the computer… Read More »