Similar Articles |
|
T.H.E. Journal September 2003 Roger Del Russo |
Securing Your Computer Network Your entire district could be brought to its knees by a hacker's assault, and the costs of reviving the network could be astronomical. While district administrators may have devised plans for securing the physical plant of the school, they rarely consider the vulnerability of their computer networks. |
Unix Insider May 2000 Carole Fennelly & Brian Martin |
Hacker's toolchest What is a hacker's approach to penetration testing? What tools do hackers use? I decided to find out. |
Real Estate Portfolio Mar/Apr 2002 Scott Laliberte |
Preventing a Hack Job As more real estate business activity moves to the Internet, the security of electronically transmitted and stored data is becoming of greater concern. Companies in every industry are struggling to create secure systems that keep their assets safe while still operating efficiently... |
PC Magazine June 22, 2005 Larry Seltzer |
Make Your Network Safer by Attacking It A number of excellent tools can help you find out where you're network is vulnerable. |
PC Magazine March 1, 2006 Matthew D. Sarrel |
Hack Thyself Discovering security flaws is the first step toward getting your small business's computers in shape. |
PC Magazine December 30, 2003 Matthew D. Sarrel |
Network Security: Know Your Weaknesses Vulnerability scanners identify your network's insecurities. Which one of these 6 tested products will watch your back? |
PC Magazine February 26, 2007 Robert P. Lipschutz |
Perimeter eSecurity Vulnerability Assessment Taking a simple step can reveal holes in your small business's network. |
InternetNews September 7, 2010 |
Researcher Unearths Microsoft Zero-Day Flaw A security researcher who also happens to be a Google employee is warning of a new zero-day exploit affecting Internet Explorer 8 that could automatically send out unintended tweets. |
InternetNews June 23, 2004 Clint Boulton |
OASIS Passes Flaw-Reporting Standard The e-business standards body ratifies Application Vulnerability Description Language to exchange security flaw information. |
CIO June 1, 2002 Sarah D. Scalet |
Dr. Crime's Terminal of Doom Most computer attacks come from the outside. But the costliest ones come from the inside. Here's how to manage the risk without making honest employees feel like crooks |
Entrepreneur May 2004 Cleaver & Penttila |
Management Buzz 05/04 Welcoming overweight customers, employing international students and more. |
InternetNews December 16, 2005 Jim Wagner |
Dasher Worm No Friendly Reindeer Corporations are at the most risk from a recently discovered worm. |
Global Services May 27, 2007 Raj Chaturvedi |
Defining Security Expectations Documenting and sign offs on security expectations are an essential part of any sourcing deal. |
InternetNews December 9, 2005 Sean Michael Kerner |
Do Hackers Look Before They Leap? University of Maryland researchers find that port scanning isn't necessarily a harbinger of an attack. |
Salon.com August 29, 2001 Damien Cave |
How do you fix a leaky Net? Brian West says he was doing a public service when he pointed out a security hole in an Oklahoma newspaper's Web site. So why did the editor in chief call the cops? |
InternetNews May 19, 2010 |
New Vulnerability Surfaces in 64-Bit Windows A new zero-day security vulnerability is at the heart of a new Microsoft Security Advisory, which warns about a flaw that could impact a variety of 64-bit Windows systems. |
InternetNews August 5, 2004 Ryan Naraine |
Critical Flaws Spoil Opera Tune Opera updates its flagship browser to plug a series of potentially serious security holes. |
Insurance & Technology May 14, 2005 Michael Cohn |
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. |
InternetNews March 30, 2004 Ryan Naraine |
Malicious Cisco Code Circulating The release of a hacking toolkit to exploit security holes in Cisco products has sent the networking giant scrambling. |
InternetNews August 9, 2005 Jim Wagner |
Microsoft Patches 3 Critical Flaws Microsoft Windows issues three critical and three moderate-to-important fixes in its August installment of security fixes. |
InternetNews April 20, 2004 Ryan Naraine |
Exploit for Windows SSL Flaw Circulating Unpatched systems are at risk of DoS attacks but security experts warn the threat level could grow considerably. |
PC World November 9, 2001 Jennifer DiSabatino |
IE Hole Reveals Users' Cookie Data Microsoft is working on patch, but for now malicious sites could siphon information from IE 5.5 and 6.0... |