Security white papers
- The news you choose »
- LOGIN TO ADD TO WATCHLIST
Although Google hacking techniques are against Google terms of service and Google blocks well-known Google hacking queries, nothing can stop hackers from crawling websites and launching Google queries.
Google hacking can be used to locate vulnerable …Read full article » Middle East: Monday, September 14 - 2009 @ 10:30
From an IT department’s perspective, they must support the needs of all employees, while diligently maintaining security policies, which is becoming increasingly challenging now that the majority of the workforce has stepped beyond the corporate …Read full article » Middle East: Tuesday, September 08 - 2009 @ 14:38
The most notable characteristic of Mebroot is the fact that it replaces the system’s Master Boot Record with malicious code that owns the machine completely from the boot, before the operating system itself gets loaded. …Read full article » Middle East: Tuesday, September 08 - 2009 @ 13:58
Despite over $7 billion a year being spent on anti-virus and other security software, the dangers of becoming a victim of cybercrime are increasing.
What was once the hobby of amateur hackers has become the …Read full article » Middle East: Tuesday, September 08 - 2009 @ 13:48
High-profile losses of confidential data have raised awareness of the need to protect information.
Governments and industry worldwide have responded with an increasing number of more complex and frequently changing regulations.
This has made compliance …Read full article » Middle East: Tuesday, September 08 - 2009 @ 12:36
This Symantec white paper is a collection of Downadup research. As with any constantly evolving threat, new variants could present themselves at any time and may render portions of this report out-of-date.
- Increase …
An evolving workforce, reared on Web 2.0 technologies, is bringing a different perspective to how computers are used within an organisation.
Internet-enabled applications such as Instant Messaging (IM), peer-to-peer (P2P) file-sharing applications and Voice over Internet …Read full article » Middle East: Sunday, September 06 - 2009 @ 16:28
Technology growth on the Web has changed the way businesses and consumers communicate and interact with each other.
The Web has become a staple for information sharing and commercial transactions. At the same time it has …Read full article » Middle East: Wednesday, September 02 - 2009 @ 14:59
The sheer number of desktops, laptops, and servers running Windows makes them an easy and readily available target for malware writers and spammers.
The need to protect the gateway from malicious code – whatever the operating …Read full article » Middle East: Tuesday, September 01 - 2009 @ 16:30