Phishing, pharming, and vishing are three forms of social engineering attacks aimed at both individual and business targets. Read on to find out more about each of these threats, including the fine lines that differentiate them from one another.
Internet Messaging happens to be a popular means to chat with someone, no matter where this someone is located. But did you ever stop to think that when this communication is being done from within a company, it could be a huge, crippling, enterprise risk? See how IM Threats work
Need to check your online databases for vulnerabilities? HP offers a free tool to check your website for SQL Injection vulnerabilities. HP Scrawlr crawls your website looking for exploits and flaws in your code. This software is free and easy to use.
Spam is ubiquitous. All pervasive and is extremely irritating. It pulls back productivity and takes up resources, staff time, up keep time and drains resources. See how exactly spam delivers its sweet poison and ensures that your organization trots like an over burdened beast.
Did you know how vulnerable you could have been each time you opened your laptop or connected your mobile device using Wi-Fi at one of these hot spots in town? You could have been attacked virtually with an attack known an Evil Twin Attack? Yet another attack? what does it mean? Read on
The Federal Bureau of Investigation has created a computer system that allows suspected terrorist to be put in a computer program that allows a dot-collecting and dot-connecting. This program will be available at every level of government across the United States.
What motivates hackers to do what they do? How do they do what they do? And what is Leet Speak? Who are the people who break into, modify or steal data. Read this article for a look into the inner workings of a hacker’s mind. How can you protect yourself?
GhostSurf 2007 Platinum is a poltergeist that will scare away the spammers, scammers, and myriad other Internet miscreants. This security application is used to make yourself invisible on the Internet, but will it provide complete Internet anonymity? Read on to find out.
The Anonymizer Anonymous Surfing system is so good, it might make Scott McNealy rethink his views about privacy. With Anonymizer Anonymous Surfing Platinum, you’ll come about as close as possible to making all your Internet traces invisible. Find out what Anonymizer Anonymous Surfing does here.
If you’re a fan of Seinfeld, you’ll remember the Bubble Boy: a kid who, though good at Trivial Pursuit, could not leave a protected plastic bubble. Nothing got in and little got out. With Norton Personal Firewall, your computer will share the same fate.