Trend Micro Mobile Security 3.0 The expanding growth of converged mobile devices, increase availability of Wi-Fi networks and the faster download speeds are likely to increase the number of threats to these sorts of devices.
Friday, 17 November 2006 05:09 EST | Reviews Policy and Compliance in The Workplace Compliance. Regulation. Security. These are the reasons why organisations write policies. But how can you be sure that staff have read, understood, and agreed to policy? And how can you demonstrate policy compliance to auditors and regulators? Posting policies on the intranet, or relying on emails or staff handbooks leaves policies ignored, and impossible to track.
Monday, 13 November 2006 11:39 EST | Information Security Web-style Wireless IDS attacks Wireless intrusion detection systems (WIDS) are not yet as popular as their wired counterparts, but current trends would suggest that their number is set to grow. One positive factor in this respect is the integration of such programs with active network equipment and Management awareness of the risks associated with the unauthorised use of wireless devices.
Thursday, 9 November 2006 02:10 EST | Mobile and Wireless Sex, Spies and Hard-Drives - Wipe Data Properly On average, 70% of re-sold hard-drives and memory cards contain pornographic material according to research carried out on 1,000 hard-drives over the course of a year by Disklabs Data Recovery and Computer Forensics.
Wednesday, 8 November 2006 01:50 EST | Information Security Interview with Marc Maiffret, CTO of eEye In this interview Marc Maiffret, Co-Founder and CTO of eEye Digital Security, discusses endpoint security and its ramifications on the enterprise. eEye is the developer of Blink - the first unified client security agent.
Tuesday, 7 November 2006 02:24 EST | Editorial 802.11b Firmware-Level Attacks Denial of Service (DoS) attacks are a common threat to 802.11 wireless networks. Using widely available software and an inexpensive wireless LAN card, an attacker can halt the service of a wireless LAN at their whim. While very effective, these tools lack persistence in their operation when the attacker stops the attack or leaves the range of the victim network, client workstations automatically resume their connectivity to the network.
Monday, 6 November 2006 02:17 EST | Information Security Data, data, everywhere - Securing back-up Every day, organizations give backup copies of their data to a van driver. Media is often left in reception for collection by anyone who asks. Systems and their data are backed up so that they can be restored. Standard hardware and software can be used to reproduce corporate data and systems anywhere.
Monday, 6 November 2006 02:12 EST | Information Security Archive |