I put AntiVir Personal Edition and Microsoft Security Essentials head to head. Read this detailed antivirus comparison to find out which of the two antimalware performs better and which is the best.
The accelerated use of IT in the workplace for business and personal purposes has generated important privacy concerns because of the substantial amounts of data that is collected about employees by employers.
The main conflict discussed in the article is employee privacy vs. employer security and the main concern for both businesses and judiciary is to bring a balance between the two.
If ever there was a struggle to gain ground in the anti-malware world, the battle for Mac OS users is one of the most heated. In the midst of this struggle is the recently released Trend Micro product, Smart Surfing for Mac.
Here’s all you want to know about zombie computers such as how they are used by cybercriminals in DoS attacks and for sending out Spam for example. In this article you also find tips for preventing your computer from becoming a zombie and what to do should your system be infected by botnet software.
Here’s what Bluejacking is and all you need to know about to protect you from receiving unsolicited messages by means of Bluetooth. This article additionally contains information about Bluesnarfing, a dangerous attack which uses the same Bluetooth properties as Bluejacking.
It’s important to craft a strong password policy in order to protect your computer from compromise. This article will describe configuring the local Windows Vista password policy to adjust settings such as minimum password length and complexity requirements.
Vulnerability scanners help find weaknesses quickly and automatically which otherwise might have been missed. There are many excellent commercial vulnerability scanners, but some of the best are free. This article highlights some of the best free vulnerability scanners.
If you’ve downloaded and installed new security software or if you have made changes to existing security software you’ll likely want to verify that the software is working and will do its job. This article gives an overview on how to check if your security software is working.