Skip to main content

Home/ Information Security/ Group items tagged in

Rss Feed Group items tagged

bestow adeel

alarm monitoring Sydney - 0 views

  •  
    Joss offers security services like Alarm Monitoring, Concierge and Alarm systems in St Mary, Sydney. We also provide professional security Guards in all over Sydney.
Select Security  Systems Ltd

Wireless Security Systems - Are They Actually Safe - 1 views

  •  
    Wireless security systems in Edmonton, similar to those recommended by Select Security, incorporate incredible elements and numerous favorable circumstances over their wired partners. Look at one today and ensure your home and family with cutting edge wireless innovation.
loadperformance

Application Security in the Software Development Lifecycle Issues, Challenges and Solut... - 0 views

  •  
    This white paper will discuss in detail why application security throughout the entire software development lifecycle is necessary for businesses of all shapes and sizes to prevent web security breaches and how it helps cut down business cost and increase the level of organizational information security.
quantiq

Database security: Top 10 database vulnerabilities list - Security Bytes - 0 views

  •  
    Database administrators are all too familiar with the issues outlined in Application Security Inc.'s new Top 10 database vulnerabilities list. From the use of default passwords to patching issues, database management systems have been known to be plagued with issues making them vulnerable to attack.
Rich Hintz

What a Botnet Looks Like - CSO Online - Security and Risk - 0 views

  • What a Botnet Looks Like
  •  
    Researcher David Vorel mapped interconnected, bot-infected IP addresses and created this geometric representation; CSO contributor Scott Berinato annotated the map and added interactive controls so you can zoom in and explore botnets' inner workings
Rich Hintz

Download PDF Password Remover 3.0 Free Trial - The PDF Password Remover can be used to ... - 0 views

  • PDF Password Remover
  •  
    decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing (changing), printing, selecting text and graphics (and copying them into the Clipboard), or adding/changing annotations and form fields. Decryption is being done instantly. Decrypted file can be opened in any PDF viewer (e.g. Adobe Acrobat Reader) without any restrictions -- i.e. with edit/copy/print functions enabled. All versions of Adobe Acrobat (including 7.x, which features 128-bit encryption) are supported.
Carlos Gomes

Welcome to CAcert.org - 1 views

  • CAcert.org is a community driven, Certificate Authority that issues certificates to the public at large for free. CAcert's goal is to promote awareness and education on computer security through the use of encryption, specifically with the X.509 family of standards. We have compiled a document base that has helpful hints and tips on setting up encryption with common software, and general information about Public Key Infrastructures (PKI). For the enthusiast looking to dip their toe in the water, we have an easy way of obtaining certificates you can use with your email program. You can use these not only to encrypt, but to prove to your friends and family that your email really does come from you. For administrators looking to protect the services they offer, we provide host and wild card certificates which you can issue almost immediately. Not only can you use these to protect websites, but also POP3, SMTP and IMAP connections, to list but a few. Unlike other certificate authorities, we don't limit the strength of the certificates, or the use of wild card certificates. Everyone should have the right to security and to protect their privacy, not just those looking to run ecommerce sites. If you're extremely serious about encryption, you can join CAcert's Assurance Programme and Web of Trust. This allows you to have your identity verified to obtain added benefits, including longer length certificates and the ability to include your name on email certificates. CAcert Inc. is a non-profit association, incorporated in New South Wales Australia.
anonymous

Bruce Schneier: More on the Broad View of Security - CSO Online - Security and Risk - 0 views

  •  
    Bruce Schneier's comments on the first Workshop in Security and Human Behavior. Examples of the New School of Information Security.
Rich Hintz

Coordinated Russia vs Georgia cyber attack in progress | Zero Day | ZDNet.com - 0 views

  • Coordinated Russia vs Georgia cyber attack in progress
Rich Hintz

HIPAA.com - Physical Safeguard Standards of the HIPAA Administrative Simplification Sec... - 0 views

  •  
    We cover the four [HIPAA] physical safeguard standards and their 10 implementation specifications in 12 postings.
netifera platform

netifera video the java virtual machine as shellcode - 0 views

  •  
    In this screencast we're going to look at some features we are working on for the next version of netifera. The two main things we're going to demonstrate are geographical visualization and the netifera probe which is a deployable software agent that makes it possible to run all netifera platform tools remotely as easily as running them locally.
Skeptical Debunker

Browser history hijack + social networks = lost anonymity - 0 views

  •  
    Simply joining a few groups at social networking sites may reveal enough information for hackers to personally identify you, according to some recent computer science research. In a paper that will be presented at a security conference later this year, an international team of academics describes how they were able to build membership sets using information that social networking sites make available to the public, and then leverage an existing attack on browsing history to check for personal identity. That information, they argue, can then be combined with other data to create further security risks, such as a personalized phishing attack.
Skeptical Debunker

Sea World killer whale attack video leads to malware | Graham Cluley's blog - 0 views

  •  
    Dawn Brancheau, a trainer at Sea World in Orlando, was killed yesterday after being attacked by a killer whale. News of the tragedy sped quickly around the world, and now sick cybercriminals are exploiting the story of 40-year-old Brancheau's death for their own commerical gain. Through SEO (search engine optimisation) techniques, hackers have created webpages stuffed with content which appears to be ghoulish video footage of the animal trainer's death - but are really designed to infect visiting computers.
Seçkin Anıl Ünlü

How I would Hack your PC, Mac with USB HID - 1 views

  •  
    We live in the world full of serpents, overlook things for seconds and you are bitten to death. Trojans, viruses, malware are everywhere. They find new
« First ‹ Previous 41 - 60 of 89 Next › Last »
Showing 20 items per page