The Wayback Machine - https://web.archive.org/web/20101204163456/http://internet.com/IT/Security/SecuritySoftware
  1. Home
  2. IT
  3. Developer
  4. Certifications & Degrees
Hardware And SystemsIT ManagementNetworking And CommunicationsOpen SourceSecuritySmall BusinessStorage
Best PracticesMalwareSecurity SoftwareViruses And Patches
Security Software  
EU Opens Antitrust Probe Into Google Search
European antitrust authorities announce a formal inquiry into allegations from Google's competitors that the search giant used its market clout to undermine competition.
Wikileaks Diplomatic Cable Cache Links China to Google Hack
WikiLeaks document stash indicates longstanding cyber espionage campaign orchestrated by Chinese government, prompts harsh White House condemnation of leak.
Seven Security Policies for the IPv6 Network of the Future
IPv6 will change the way you think about security forever. An engineer from Cisco has proposed seven rules that leverage cooperation to make life after NAT less scary.
Senate Panel Passes Controversial Online Piracy Bill
Legislation that would crack down on websites engaging in trafficking of counterfeit goods and pirated content heads to the Senate floor amid heated opposition from digital-rights groups.
Selecting the Best Data Wiping Software
When you need to delete sensitive information from a computing device, you need the best possible data wiping software.
IT System Patching: Don't Delay
Patches from OS and software vendors need to be applied promptly and regularly to prevent downtime and security risks.
USB Devices Aiding Malware Attacks
Security experts say that USB devices play a role in as many as 1 in 8 malware attacks.
Wireshark's a Killer App for Packet Hunting
Network traffic analysis is the kind of detective work that that can really soak up a lot of your time and energy. Wireshark is one tool that can save you a lot of that time and energy, thanks to its sheer power and simplicity.
Microsoft Patch Tuesday: Light Release
This release will be a marked contrast to recent Patch Tuesdays, in which Microsoft offered long lists of patches.
Cloud Computing and Privacy Concerns
To best understand the Cloud Computing privacy issue, it is effective to divide the exposure use cases into three categories.
Email Scammers Aim at Military Families
Phishers use unsolicited emails pretending to be from USAA, a financial services firm, to obtain sensitive data.
How Risky is Android Mobile OS Code?
The Android mobile OS has in excess of 300 software flaws, according to a commercial code analysis firm. Yet doesn't every OS have its imperfections?
Understanding (and Stopping) Cross-Site Scripting Vulnerabilities
XSS vulnerabilities often target users but offer a way for malicious users to turn around and crack sites. Here's how they work and how to stop them.
Google Updates Policy After Camera-Equipped Car Gaff
The search giant freely admits that it failed in protecting users' privacy, conceding that it intercepted emails and passwords over unencrypted wi-fi networks.
So, Microsoft, How's Secure Windows Working Out?
It has been years since Microsoft announced security was a key priority. With many Patch Tuesdays behind us -- the largest ever just this week -- where's the company stand?
Is Facebook Security an Oxymoron?
It's time for Facebook and Facebook users to finally get serious about security –- or risk the consequences.
Ease 802.1X Deployments With the SU1X Configuration Tool
SU1X provides a simple 802.1X configuration wizard network administrators can distribute to end users, cutting down on frustrating configuration errors and speeding deployment.
Buffer Overflows 101: What Are They, How Do You Stop Them?
If you take a tour of the Metasploit penetration testing framework you'll notice plenty of exploits with a common technique: buffer overflows. Paul Rubens explains what they are and how to prevent them.
Diluted ACTA IP Accord Offers Consolation to Digital-Rights Groups
With the final draft of the Anti-Counterfeiting Trade Agreement now available to the public, interested parties evaluate the impact on Internet service providers.
Microsoft Patch Tuesday: 16 Patches
Within the 16 patches to be released on Tuesday, Microsoft rates four of them as "critical."
White House IP Boss: Digital Piracy Costs U.S. Jobs
Linking IP enforcement with the economic recovery, Victoria Espinel has high hopes for the Anti-Counterfeiting Trade Agreement as the final draft nears completion and public release.
EFF Heralds Victory After Senate Shelves IP Bill
Leading digital rights group wins a battle in its fight against what it sees as overreaching Internet infringement legislation, though it acknowledges the war is far from over.
Cyberwar Simulation: Is America Ready?
Scores of businesses are taking part in Cyber Storm III, a US government simulation intended to explore the ramifications of a major cyberattack.
Stuxnet Marks the Ongoing Power of the Worm
Though the focus on security has shifted to Web-based threats, Stuxnet proved that a well-aimed worm can still wreak havoc, even in the physical realm.
White House IP Chief Talks Tough on Online Piracy
U.S. Intellectual Property Enforcement Coordinator Victoria Espinel touts administration's efforts to crack down on Internet piracy, praises controversial Senate bill to blacklist offending sites.
WHITEPAPERS AND EBOOKS  Advertisement
HOTTEST SECURITY SOFTWARE DISCUSSIONS 
Advertisement
Visualize your workspace with new multiple monitor support, powerful Web development, new SharePoint support with tons of templates and Web parts, and more accurate targeting of any version of the .NET Framework. Get set to unleash your creativity. Download the Trial Now!
Many of the largest IT budget problems can be traced back to five big money drains. This e-book, provided by IBM, will introduce you to the five big IT budget killers - and some of the best ways to knock them out. Get it now.
Windows Azure features a very powerful, yet simple deployment model. By focusing on your application and abstracting away the infrastructure details, you can deploy almost any app with minimal fuss. Start Here.

Phony Holiday Tweets Hide Malware
Shortened URLs posted on Twitter may not lead to the holiday-themed sites listed.

Groupon, LivingSocial Attract Big Tech Interest
LivingSocial just announced a $175 million investment by Amazon, but will Groupon soon have even bigger news?

Google Chrome 8 Stable Addresses 800 Flaws
Search giant continues its breakneck clip of developing its Chrome browser, this week issuing a release that includes fixes for some 800 vulnerabilities and other bugs.

IBM Refreshes AppScan to Secure Input Validation
New release of AppScan platform -- version 8 -- from Big Blue targets cross-site scripting and SAL injection vulnerabilities with string analysis for secure coding.

Oracle Unveils New SPARC Servers, Roadmap
Database giant showcases SPARC-based Exalogic Elastic Cloud and SPARC Supercluster, accompanied by a product roadmap for future development.

Advertisement


Internet.com
The Network for Technology Professionals

About Internet.com

Legal Notices, Licensing, Permissions, Privacy Policy.
Advertise | Newsletters | E-mail Offers