Honeypots are flexible and come in various shapes and size. The two broad types are low interaction and high interaction types. A low interaction windows honeypot is plug and play. High interaction honeypots are complex and require dedicated resources.
News and information about security and vulnerability testing
The latest news and information about security and vulnerability testing and reviews of leading products.
Are you having difficulty to remove fraud tool using your anti-malware or anti-virus program. Rkill will assist your scanner and remover in terminating malicious processes. Read the series of article about Rkill by Lawrence Abrams.
Browser Helper Object for Internet Explorer is often found in end-users machine. Some are rogue BHO while others will help protect our computer and data in downloading unsafe file or in visiting fraud website. This article will discuss and compare the IE add-ons by Microsoft, Lavasoft & Javacool.
With all the breathtaking security risks to our computers out there, it’s equally breathtaking that many people don’t bother to scan their computer to see if they’re vulnerable to a hacker or other threats.
The accelerated use of IT in the workplace for business and personal purposes has generated important privacy concerns because of the substantial amounts of data that is collected about employees by employers.
If ever there was a struggle to gain ground in the anti-malware world, the battle for Mac OS users is one of the most heated. In the midst of this struggle is the recently released Trend Micro product, Smart Surfing for Mac.
Here’s all you want to know about zombie computers such as how they are used by cybercriminals in DoS attacks and for sending out Spam for example. In this article you also find tips for preventing your computer from becoming a zombie and what to do should your system be infected by botnet software.
Here’s what Bluejacking is and all you need to know about to protect you from receiving unsolicited messages by means of Bluetooth. This article additionally contains information about Bluesnarfing, a dangerous attack which uses the same Bluetooth properties as Bluejacking.
Vulnerability scanners help find weaknesses quickly and automatically which otherwise might have been missed. There are many excellent commercial vulnerability scanners, but some of the best are free. This article highlights some of the best free vulnerability scanners.
If you’ve downloaded and installed new security software or if you have made changes to existing security software you’ll likely want to verify that the software is working and will do its job. This article gives an overview on how to check if your security software is working.
This article outlines some of the ten best tips to put into place to secure your Mac OS X operating system.