• April 09, 2007 09 Apr'07

    Can service providers prevent DDoS attacks?

    The results of a DDoS attack can be crippling, but what are service providers doing about the threat? In this SearchSecurity.com Q&A, Ed Skoudis explains how innovative ISPs are raising the bar -- and malicious hackers are jumping right over it.  Continue Reading

  • April 09, 2007 09 Apr'07

    How can attackers exploit RSS software flaws?

    RSS syndication feeds are a convenient way to get your news, blogs or other favorite content, but these popular tools are often left exposed. In this SearchSecurity.com Q&A, Ed Skoudis explains how malicious hackers can attack RSS software and ...  Continue Reading

  • April 09, 2007 09 Apr'07

    WEP crack demonstrates need for WPA2

    A new paper highlighting the weakness of Wired Equivalent Privacy (WEP) is a call to all users to switch to the more secure Wi-Fi Protected Access 2 (WPA2).  Continue Reading

  • April 09, 2007 09 Apr'07

    Why can't antimalware tools scan inside virtual machines?

    You'd think that it would be easy for an antimalware tool to see what's going on inside a virtual workstation. Unfortunately, it's not. In this expert Q&A, Ed Skoudis explains the difficulty of scanning a guest virtual machine.  Continue Reading

  • April 09, 2007 09 Apr'07

    How can hackers bypass proxy servers?

    Hackers are bypassing proxy servers all the time and doing so for a variety of reasons. In this SearchSecurity.com expert Q&A, Ed Skoudis points out the holes in your protective filtering tools.  Continue Reading

  • April 09, 2007 09 Apr'07

    Spam campaign uses Storm-like attack technique

    Spammers used an attack technique much like last January's "Storm" assault to dupe people into downloading malware over the weekend. This time, they used fake WWIII headlines.  Continue Reading

  • April 09, 2007 09 Apr'07

    Will the botnet threat continue?

    Is the botnet threat here to stay? In this SearchSecurity.com Q&A, information security threat expert Ed Skoudis explains how these money-making machines will become a greater threat in 2007.  Continue Reading

  • April 06, 2007 06 Apr'07

    Vista SP1: To be or not to be?

    This week in Security Blog Log: The owner of The Hotfix.net blog sparks controversy by posting what he claims are 100 fixes slated for Windows Vista Service Pack 1 (SP1).  Continue Reading

  • April 05, 2007 05 Apr'07

    Polymorphic viruses call for new antimalware defenses

    Attackers are always looking for innovative ways to dodge antivirus software, and many of the bad guys are now creating polymorphic code to do just that. But it's not just the malware writers who are raising the bar. In this tip from our Ask the ...  Continue Reading

  • April 05, 2007 05 Apr'07

    Symantec NetRecon

    Readers praised Symantec NetRecon's ROI, its integration with threat-management systems and its rapid vulnerability identification. The bronze medal product tests the network infrastructure for security gaps and provides recommendations on how to ...  Continue Reading

  • April 05, 2007 05 Apr'07

    AirDefense Enterprise

    Readers noted AirDefense Enterprise's ability to detect wireless intruders and mitigate attacks. The bronze medal product was also recognized for its access control capabilities.  Continue Reading

  • April 05, 2007 05 Apr'07

    QualysGuard Enterprise (2007)

    Readers gave QualysGuard Enterprise this year's gold, applauding the product's ability to identify network vulnerabilities quickly and accurately. QualysGuard -- which also audits networks for compliance -- received more high marks for its easy ...  Continue Reading

  • April 05, 2007 05 Apr'07

    Check Point VPN-1 Edge Appliance

    Taking silver largely for its ease of management, Check Point's VPN-1 Edge Appliance supports a number of wireless protocols and is designed to extend wireless threat management capabilities to enterprise branch offices.  Continue Reading

  • April 05, 2007 05 Apr'07

    SonicWALL PRO: Unified threat management product review

    Readers appreciated SonicWALL PRO's ability to provide deep-packet inspection of network traffic. The all-in-one appliance took home a bronze medal for its networking, routing, firewall, secure wireless and IPsec VPN capabilities.  Continue Reading

  • April 05, 2007 05 Apr'07

    Cisco Wireless LAN Security Solution for Large Enterprise

    Cisco Wireless LAN Security Solution for Large Enterprise, formerly known as Wireless Security Suite, dominated this year's wireless security category. Top features of the product include its support for the 802.11i WiFi security standard and its ...  Continue Reading

  • April 05, 2007 05 Apr'07

    Data security breach at UCSF may have exposed thousands

    The University of California at San Francisco (UCSF) acknowledged Wednesday that a security hole in a computer server may have exposed 46,000 people to potential identity fraud.  Continue Reading

  • April 05, 2007 05 Apr'07

    ISS Internet Scanner

    ISS Internet Scanner -- now owned by IBM -- earned the silver medal for its vulnerability detection, its ease of use and its reporting capabilities. Internet Scanner is a big help for CISOs that want to keep an accurate inventory of their networks' ...  Continue Reading

  • April 05, 2007 05 Apr'07

    Check Point VPN-1 UTM

    There's plenty to be said for Check Point's stability as a security vendor. Its VPN-1 UTM, formerly known as Express CL, received high marks from the information security crowd. Readers recognized the depth of security that the product provides, as ...  Continue Reading

  • April 05, 2007 05 Apr'07

    Firm takes steps to address email management security risks

    Frank Chambers, director of security management at Constellation Energy explains how his firm manages email risk.  Continue Reading

  • April 05, 2007 05 Apr'07

    More Windows patches coming next week

    In a preview of next week's monthly patch release, Microsoft said it plans to issue four more Windows updates on top of the ANI fix it rushed out this week.  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close