Advertisement
  • Networking
  • Storage
  • Security
  • Mobility and Wireless
  • Applications
  • OS and Servers
  • Mid-sized Business
  • Green IT

Home | News | Insight | How-tos | Case studies | Interviews | Briefings | Reviews | Blog

Computer & Internet Security

Computer & Internet Security RSS FeedTechworld Security is your essential resource for all the latest anti-virus protection news, intrustion prevention systems news, firewalls news, anti-phishing products news, biometrics and other security products news.


News Headlines

More Computer & Internet Security news »


Insight articles

  • Securing servers in the cloud
    The ease and speed of deploying a virtualised environment has allowed some IT professionals to overlook security concerns that may be brewing up in the cloud.
  • Why employees ignore security
    We asked Frank Kenney, a Gartner analyst focused on application development and integration, for some thoughts on the major reasons why people don't adhere to corporate security policies.
  • What the security industry can learn from Wall Street
    On the face of it, the workings of financial markets are a world away from the security industry, and yet there are instructive parallels if you stare a little harder.

More Insight articles »


How-Tos

  • How to assess laptop encryption products
    The past year has seen a record number of companies losing laptops containing confidential, often unencrypted, data. IT managers have it their power to protect that data, but what encryption technology should they be following? TPM or an alternative? We run our eye over the options.
  • Admin tips for securing Vista
    By making a few judicious changes using the security tools within Vista - and in some cases by adding a few pieces of free software - you can lock down your operating system like a pro.
  • Understanding malware attack techniques
    One of the best things you can do to help keep your PC and your private data safe is to stay abreast of the latest security alerts. But security news stories often contain techie jargon that can make your eyes glaze over faster than a congressional session on C-SPAN.

More How-Tos »


White papers

  • Extreme SavingsNew

    This paper explores how enterprises can use Wide Area Data Services to cut hard costs and make the most of their existing infrastructure, without negatively impacting their operations.

  • Accelerating Virtualised EnvironmentsNew

    Discover how wide-area data services help deliver the benefits of virtualisation and IT consolidation while addressing the challenges of performance and availability.

  • The Evolving Role of the CIONew

    This whitepaper looks at the findings of a recent survey of successful CIOs from a number of industries, and examines what's needed for the role of the CIO to evolve.

More white papers »


Briefings

More Briefings »


Computer & Internet Security topics pages

Authentication | Email security | Firewall protection | Internet security | Internet security system | Intrusion | Intrusion prevention | Intrusion prevention system | Personal firewall | Security software | Spyware software | User authentication | Virus program | Virus software | Windows firewall | Wireless LAN security | Wireless security
All topics »

  Windows Security Articles  

 

Updated: Sunday 15 February 18:23 UK

What's new on the security front with Windows 7?

Taking a look at Windows 7 security features and whether, from a purely security standpoint, it is worth the upgrade.

Troubleshooting Kerberos in a Sharepoint Environment (part 2)

Taking a look at SPN Configuration, Duplicate Service Principal Names and DNS Configuration mismatch.

RSA SecurID - Voted WindowSecurity.com Readers' Choice Award Winner - Authentication/Smart Cards

RSA SecurID was selected the winner in the Authentication/Smart Cards category of the WindowSecurity.com Readers' Choice Awards. SafeWord 2008 and eToken were first runner-up and second runner-up.

Unveiling IE 7 and Integrity Levels

How Windows Vista's Internet Explorer 7 comes with Protected Mode, works with User Account Control, and provides Integrity Levels for internet protection.

The End of Passwords?

The end of passwords and how new technologies will keep enterprise information assets secure.

More »

  • Advertisement

Blog: The War on Error

More Computer & Internet Security blog entries »


Reviews

  • Memeo Backup Premium 3.5 New
    Ever since the makers of external hard drives realised that bundling a backup program with their products was a sensible idea, programs like Memeo Backup have been on the rise. Are they worth the outlay?
  • GoodSync Pro 7.2
    Synchronisation is the alternative to backup, but it is also a much more complex world. Does this program keep life simple enough?
  • Billion BiPAC 7402GX router
    Billion's latest BiPAC ADSL router is an attempt to add 3G failover to what is otherwise a competent and well-featured if unadventurous 802.11g switch/router. Its other strength is its VPN capability.
  • DrayTek Vigor 2820Vn router
    A remote office or small office router with ADSL, WAN and 3G failover that doesn't cost the earth? Not possible they said. DrayTek's latest Vigor can do all this and more.
  • SanDisk Cruzer Professional
    Where did it go wrong for the once inoffensive USB memory stick? A new generation of drives using mandatory encryption attempt to make them loved once more.

More Computer & Internet Security reviews »


  • Advertisement

Interviews

  • SailPoint tackles the threat from within
    A Texas-based company has come up with a solution for large enterprises to protect themselves from disgruntled internal staff, which it says is a growing risk for companies forced to lay off staff during these tough economic times.
  • Security's virtual badlands
    We hear from Sourcefire CTO Martin Roesch why virtualisation is still Terra Incognita for network security technologists - and why he believes his company is worth more its rivals and the stock market seem to think.
  • How a laptop nearly ruined one man's life
    When the Commonwealth of Massachusetts issued Michael Fiola a Dell Latitude in November 2006, it set off a chain of events that would cost him his job, his friends and about a year of his life, as he fought criminal charges that he had downloaded child pornography on to the laptop.

More Interviews »


Case Studies

  • Network behaviour analysis secures university
    Seeking better visibility into the traffic crossing its extensive network, Wayne State University turned to NBA software from Q1 Labs.
  • UTM's weakness: a single point of failure
    The team had a wealth of options. They could have chosen to install one or more UTM appliances, devices that handle multiple threats from a single chassis, or opted for a series of single function, best of breed appliances. So, which one was it to be?
  • Protecting the datacentre
    Mercy Medical Centre’s security wish list is far from atypical. The Baltimore healthcare provider wants to make sure that users access only the services and servers they require and that its datacentre servers remain secure and problem free. Nevertheless, it hasn't yet found quite the right technology combination.

More Case Studies »


  Security Alerts  

Updated: Sunday 15 February 18:25 UK

[2/5] UniversalIndentGUI "SettingsPaths::init()" Insecure Temporary Files

A security issue has been reported in UniversalIndentGUI, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

[3/5] PHP Krazy Image Host Script "id" SQL Injection Vulnerability

x0r has discovered a vulnerability in PHP Krazy Image Host Script, which can be exploited by malicious people to conduct SQL injection attacks.

[3/5] Free Joke Script Multiple SQL Injection Vulnerabilities

MuhaciR has reported some vulnerabilities in Free Joke Script, which can be exploited by malicious people to conduct SQL injection attacks.

[3/5] Swann DVR4-SecuraNet Directory Traversal Vulnerability

Terry Froy has reported a vulnerability in Swann DVR4-SecuraNet, which can be exploited by malicious people to disclose sensitive information.

[2/5] Sun Java System Directory Server Directory Proxy Server Denial of Service

A vulnerability has been reported in Sun Java System Directory Server, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service).

[2/5] Sun Solaris / SEAM Kerberos PAM Module Privilege Escalation

Sun has acknowledged a vulnerability in Solaris and Sun Enterprise Authentication Mechanism (SEAM), which can be exploited by malicious, local users to gain escalated privileges.

http://secunia.com/Advisories/33921/ NOTE: This RSS feed does not include information about updated Secunia advisories. You should note that Secunia on average issues more than 20 updated advisories per day, containing information about exploit and patch availability, new and in depth research, and all other details that are relevant. Learn more about receiving complete and customised Secunia advisory information: http://secunia.com/advisories/business_solutions/

more »

  • Advertisement

WHITE PAPERS

Techworld topic pages