Monthly Archives: January 2007

SurfControl E-mail Security Wins Coveted Checkmark Certifications

SurfControl has announced that SurfControl’s MailControl has been awarded Anti-Spam Premium Checkmark Certification from West Coast Labs. This level of certification is awarded to solutions that have a spam capture rate of more than 97 percent and SurfControl MailControl successfully identified over 99 percent.

Malware creates new challenges for anti virus vendors

Over the past few years those monitoring trends on malicious Internet activities have noticed a significant change. We are seeing a sizeable decrease in the media grabbing pandemic outbreaks of malicious software. Yet with less headlines on high risk infectors we are still seeing an increasing overall number of malware infections, it is this new… Read More »

New Year, New Threats?

According to GFI, a leading provider of network security, content security and messaging software, every IT manager should make it part of their New Year’s Resolution to protect their networks from the following threats in 2007.

US defences hacking attacks on the rise

A recent report outlining the threat to US defence security reveals that hacking attempts have gone up by 43 per cent. The desire, of hackers, to obtain and thereby steal or corrupt technology design data could have terrifying results should this information fall into the ‘wrong hands’.

Preventing a Brute Force or Dictionary Attack

Administrative accounts are not the only problem: many Web applications and Web application frameworks create default users during installation. If the site administrator does not remove these default users or at least change their passwords, these accounts will be easy targets for a dictionary attack. Finally, when users are allowed to choose their own usernames,… Read More »

Preventing a Brute Force or Dictionary Attack

To understand and then combat a brute force attack, also known as a dictionary attack, we must start by understanding why it might be an appealing tool for a hacker. To a hacker, anything that must be kept under lock and key is probably worth stealing. If your Web site (or a portion of it)… Read More »

The Consumerization of IT Demands Policy enforcement

Throughout 2007 IT will need to prepare itself for an onslaught of unmanaged IP enabled devices as millions of users plug in new computers, USB drives, music/video players, handheld mobile devices, and even the stray game console into enterprise networks. In addition to new shiny objects, many users install applications like iTunes, VoIP, multi-player games,… Read More »

Voice over IP under threat

There has recently been considerable alarm about the possibility of a malicious code spreading via Skype. Skype is a system that allows voice communication over established Internet connections, in an environment very similar to that of telephone calls. It even allows calls to be made to telephones from a computer, with lower tariffs than that… Read More »