close
The Wayback Machine - https://web.archive.org/web/20071230100844/http://techworld.com:80/Security/
Advertisement
  • Networking
  • Storage
  • Security
  • Mobility and Wireless
  • Applications
  • OS and Servers
  • Mid-sized Business
  • Green IT

Home | News | Insight | How-tos | Case studies | Interviews | Briefings | Reviews | Blog

Computer & Internet Security

Computer & Internet Security RSS FeedTechworld Security is your essential resource for all the latest anti-virus protection news, intrustion prevention systems news, firewalls news, anti-phishing products news, biometrics and other security products news.


Computer & Internet Security News

More Computer & Internet Security news »


Blog: Focus On Endpoint Security

Computer & Internet Security Insight articles

  • Why is being a VoIP company such hard work?
    How many smallish companies have this list of woes in twelve months and get away with it? Here’s a rundown of Skype’s year to bury.
  • VoIP is the next big hack
    Peter Cox discusses his proof-of-concept VoIP hacking tool - and why people need to take the vulnerability of running phone calls over an IP network seriously.
  • Crossing VoIP's security minefield
    I'm hearing more about new kinds of attacks on the LAN, such as VoIP attacks or using printers as a source of attack. How can LAN security help me prevent such events?

More Computer & Internet Security Insight articles »


Computer & Internet Security How-Tos

More Computer & Internet Security How-Tos »


White papers

  • Comfortable Remote-Access without Compromises

    Astaro “One-click-VPN” solution offers new ways combining the ease of use of SSL with the functionality of traditional techniques.

  • The Need for Vulnerability Management

    This guide describes the need for Vulnerability Management. It introduces the sources of vulnerabilities and their related fallout, then relates why the nature of modern threats to the network requires automated technology to counter sophisticated exploits. Find out more

  • A Business Approach to Right Time Decision Making

    The upshot of information arbitrage is that organizations optimize performance, because workers can correct problems and exploit new opportunities before it is too late to affect bottom-line results.

More white papers »


Computer & Internet Security Briefings

More Computer & Internet Security Briefings »


Computer & Internet Security topics pages

Authentication | Email security | Firewall protection | Internet security | Internet security system | Intrusion | Intrusion prevention | Intrusion prevention system | Personal firewall | Security software | Spyware software | User authentication | Virus program | Virus software | Windows firewall | Wireless LAN security | Wireless security
All topics »

BERJAYA

  Windows Security Articles  

 

Updated: Sunday 30 December 09:23 UK

Altiris SecurityExpressions - Voted WindowSecurity.com Readers' Choice Award Winner - Network Auditing Software

Altiris SecurityExpressions was selected the winner in the Network Auditing Software category of the WindowSecurity.com Readers' Choice Awards. Professional Audit Expander and SSL-Explorer Enterprise Edition Protection were first runner-up and second runner-up.

Analyzing a Hack from A to Z (Part 1)

Within this article series we will both pull off a hack, and analyze its methodology. By understanding a hacker's methodology one can better defend one's networks.

Phishing Metamorphosis in 2007 - Trend and Developments

An account of various trends and developments that phishers embraced during 2007, and what are the driving factors behind the huge percentage increases in phishing emails during the year.

Group Policy related changes in Windows Server 2008 - Part 3: Introduction to Group Policy Preferences

The upcoming Windows Server 2008 operating system brings a lot of new goodies. This article series will focus on the Group Policy related features which will bring both easier manageability and better security.

AccessPoint SSL VPN Software - Voted WindowSecurity.com Readers' Choice Award Winner - VPN Software Category

AccessPoint SSL VPN Software was selected the winner in the VPN Software category of the WindowSecurity.com Readers' Choice Awards. Astaro VPN Clients and SSL-Explorer Enterprise Edition Protection were first runner-up and second runner-up.

BERJAYA

More »

BERJAYA
  • Advertisement

Computer & Internet Security Blog: The War on Error

More Computer & Internet Security blog entries »


Computer & Internet Security Reviews

  • Consentry LANshield Controller and Switch
    The Consentry NAC range offers a variety of products and a simple but effective way of authenticating users. By using a combination of a switch and a controller, users have a variety of ways of configuring their own networks.
  • Applicure dotDefender 3.0
    Vanilla web server security won't stop SQL injection, cross-site scripting, worms, and other assaults. Applicure dotDefender 3.0 is an easily managed server plug-in, protects against these types of attacks.
  • Buffalo MiniStation TurboUSB
    Portable hard drives should be about as interesting as the oversize cigarette packets they resemble. This one reckons it's special.
  • Yoggie Pico Pro
    The Pico, from Israeli startup Yoggie, is a new version of a mobile security product we looked at earlier in the year, the Yoggie Gatekeeper Pro. It's smaller, cheaper, and a bit faster, and has no Ethernet connectivity. Is less more then?
  • AirTight SpectraGuard, wireless LAN security
    Here's a system that can warn you about wireless intrusion and rogue access points on your network.

More Computer & Internet Security reviews »


  • Advertisement

Computer & Internet Security Interviews

More Computer & Internet Security Interviews »


Computer & Internet Security Case Studies

  • Protecting sensitive information in transit
    The City of London Police use biometric security-enabled Stealth MXP USB storage devices for sensitive information transfer, HMRC could learn from this.
  • College gets the NAC
    Until Carroll College bought into NAC technology, it took six weeks of work by a dozen full-time IT staff and student volunteers to clean up student PCs.
  • College gets the NAC of wireless security
    Wireless security was an opportunity for Sinclair Community College to update its security strategy and serve its users better

More Computer & Internet Security Case Studies »


BERJAYA

  Security Alerts  

Updated: Sunday 30 December 09:25 UK

[3/5] RunCms Multiple Vulnerabilities

Some vulnerabilities have been reported in RunCms, two of which have unknown impact and others, which can be exploited by malicious users to conduct script insertion attacks and to compromise a vulnerable system, and by malicious people to conduct cross-site scripting attacks and SQL injection attacks.

[3/5] ZeusCMS SQL Injection and Information Disclosure

EgiX has discovered two vulnerabilities in ZeusCMS, which can be exploited by malicious people to disclose sensitive information or to conduct SQL injection attacks.

[3/5] Joovili "picture" Local File Inclusion Vulnerability

EcHoLL has reported a vulnerability in Joovili, which can be exploited by malicious people to disclose sensitive information.

[3/5] Netembryo "Url_init()" Denial of Service Vulnerability

Luigi Auriemma has reported a vulnerability in Netembryo, which can be exploited by malicious people to cause a DoS (Denial of Service).

[3/5] FAQMasterFlexPlus Cross-Site Scripting and SQL Injection

Juan Galiana has reported some vulnerabilities in FAQMasterFlexPlus, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

[4/5] Feng Multiple Vulnerabilities

Luigi Auriemma has reported some vulnerabilities in Feng, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.

Be sure to check if your system is missing security updates or have insecure applications installed: http://secunia.com/software_inspector/ Feature Overview - The Secunia Software Inspector: * Detects insecure versions of applications installed * Verifies that all Microsoft patches are applied * Assists you in updating your system and applications * Runs through your browser. No installation or download is required.

BERJAYA

more »

BERJAYA
  • Advertisement
IDG Connect UK
  • A Business Approach to Right Time Decision Making
    The upshot of information arbitrage is that organizations optimize performance, because workers can correct problems and exploit new opportunities before it is too late to affect bottom-line results.
  • The Need for Vulnerability Management
    This guide describes the need for VM. It introduces the sources of vulnerabilities and their related fallout, then relates why the nature of modern threats to the network requires automated technology to counter sophisticated exploits. Find out more

Techworld topic pages