1. Security A to Z: Wi-Fi

    Date: 11/28/06     Keywords: no keywords

    For all Wi-Fi has done to bring people online, it's also opened them up to potential risk.

    Source: http://news.zdnet.com/2100-1009_22-6138750.html

  2. Security A to Z: Two-factor authentication

    Date: 11/28/06     Keywords: no keywords

    Banks and other online financial institutions consider alternatives to the password.

    Source: http://news.zdnet.com/2100-1009_22-6138707.html

  3. Security A to Z: Rootkits

    Date: 11/27/06     Keywords: no keywords

    Hackers aren't the only ones using rootkits. The Sony fiasco brought the toolkits into the mainstream.

    Source: http://news.zdnet.com/2100-1009_22-6138674.html

  4. Security from A to Z: Neologisms

    Date: 11/27/06     Keywords: spam

    An inordinate number of new terms have been created to keep up with the dubious activities of spammers, scammers and their ilk.

    Source: http://news.zdnet.com/2100-1009_22-6138651.html

  5. Security from A to Z: Microsoft

    Date: 11/27/06     Keywords: software

    The software giant has created a hole that many software companies are gladly stepping in to fill.

    Source: http://news.zdnet.com/2100-1009_22-6138623.html

  6. Security from A to Z: Google

    Date: 11/27/06     Keywords: security

    Just picture what the search giant has to do to keep all that data private. Part of a series on hot security topics.

    Source: http://news.zdnet.com/2100-1009_22-6138507.html

  7. Security from A to Z: Cell phone threats

    Date: 11/27/06     Keywords: security, virus

    Are mobile viruses a real threat? As cell phone sales grow, the question is more pressing. Part of a series on hot security topics.

    Source: http://news.zdnet.com/2100-1009_22-6138495.html

  8. Security from A to Z: Federated ID

    Date: 11/27/06     Keywords: security

    This system aims to make it easier for people to manage logins across a number of digital resources. Part of a series on hot security topics.

    Source: http://news.zdnet.com/2100-1009_22-6138475.html

  9. Security from A to Z: Extradition

    Date: 11/27/06     Keywords: security

    Hacking is an international crime. Is extradition the right way for governments to go? Part of a series on hot topics in security.

    Source: http://news.zdnet.com/2100-1009_22-6138467.html

  10. E-mail gangs bombarding Britain with spam

    Date: 11/27/06     Keywords: spam

    Experts blame rise in spam on computer programs that hijack millions of home computers.

    Source: http://news.zdnet.com/2100-1009_22-6138454.html

  11. Security from A to Z: DDoS

    Date: 11/27/06     Keywords: security, web

    Denial-of-service attacks, which take down a Web resource, are used by digital blackmailers. Part of a series on hot security topics.

    Source: http://news.zdnet.com/2100-1009_22-6138447.html

  12. Security from A to Z: Botnet

    Date: 11/27/06     Keywords: security, spam

    These armies of zombie PCs are used by cybercriminals for sending spam. Part of a series on hot security topics.

    Source: http://news.zdnet.com/2100-1009_22-6138435.html

  13. Security from A to Z: Antivirus

    Date: 11/27/06     Keywords: software, security, virus, antivirus

    The lowdown on how antivirus software works and what it needs to do in the future. A section is a series on security basics.

    Source: http://news.zdnet.com/2100-1009_22-6138424.html

  14. Firefox, IE vulnerable to fake login pages?

    Date: 11/22/06     Keywords: security

    Flaw could enable attackers to compromise usernames and passwords, security researcher warns, citing exploit on MySpace.

    Source: http://news.zdnet.com/2100-1009_22-6137844.html

  15. Microsoft lawsuits reeling in alleged phishers

    Date: 11/22/06     Keywords: no keywords

    Company's 129 lawsuits filed in Europe and the Middle East over the past eight months include 97 criminal procedures.

    Source: http://news.zdnet.com/2100-1009_22-6137804.html

  16. Attack code targets zero-day Mac OS X flaw

    Date: 11/21/06     Keywords: security

    The unpatched security hole could be used by a remote attacker to compromise a vulnerable Mac, advisories say.

    Source: http://news.zdnet.com/2100-1009_22-6137710.html

  17. Small companies ignorant of security?

    Date: 11/21/06     Keywords: no keywords

    Former White House adviser Howard Schmidt warns that hackers aren't just going after big corporations, and small businesses must beware.

    Source: http://news.zdnet.com/2100-1009_22-6137381.html

  18. Check Point to buy Swedish security company

    Date: 11/20/06     Keywords: no keywords

    In $586 million deal, Israeli company picks up Protect Data and subsidiary Pointsec Mobile Technologies.

    Source: http://news.zdnet.com/2100-1009_22-6137108.html

  19. 'Tis the season to send spam

    Date: 11/20/06     Keywords: shopping

    The volume of junk e-mail is spiking--just as consumers gear up for holiday shopping.

    Source: http://news.zdnet.com/2100-1009_22-6136901.html

  20. IBM to launch security software for small business

    Date: 11/20/06     Keywords: software, security

    IBM on Monday plans to unveil a scaled-down version of its federated security software to reach companies of up to 5,000 employees.

    Source: http://news.zdnet.com/2100-1009_22-6136996.html

Previous page  ||  Next page


antivirus | apache | asp | blogging | browser | bugtracking | cms | crm | css | database | ebay | ecommerce | google | hosting | html | java | jsp | linux | microsoft | mysql | offshore | offshoring | oscommerce | php | postgresql | programming | rss | security | seo | shopping | software | spam | spyware | sql | technology | templates | tracker | virus | web | xml | yahoo | home