Order of the day Integrated Security
Related Articles
- Today's Attackers Can Find the Needle. Mimoso, Michael S.; Savage, Marcia // Information Security;Jun2006, Vol. 9 Issue 6, p24
This article discusses the type of for-profit crime plaguing the Internet. Today's hackers want customer data and intellectual property and they also want to infiltrate government agencies. Stealth technology that are being used by attackers include rootkits which are bundled in spyware. Ways to...
- An Usage-Centric Botnet Taxonomy. Czosseck, Christian; Podins, Karlis // Proceedings of the European Conference on Information Warfare & ;2011, p65
Botnets have been a recognized threat to computer security for several years. On the timeline of malware development, they can be seen as the latest evolutionary step. Criminals have taken advantage of this new technol-ogy and cyber crime has grown to become a serious and sophisticated problem...
- Hacker tracer. // CRN;11/7/2005, Issue 1170, p38
This article focuses on various computer hackers. A buffer overflow vulnerability in Oracle l0g can allow an attacker to execute commands remotely with administrative privileges. Multiple security flaws in BCA Systems' WebLogic Server may allow an attacker to execute denial-of- service attacks,...
- EXPOSED! Top Hacker Secrets…. Macleod, Calum // Management Services;Summer2007, Vol. 51 Issue 2, p46
The article offers information on computer hacking. According to the author, it often starts when a hacker sees a file directory or workstation that is just too hard to pass by, like one named salary comparison. Once hackers decide to break into a target system, their next stop is a search...
- Ending the age of the password. // Computer Weekly;2/22/2005, p30
The article discusses the idea of ending the age of the password. IT directors face the constant challenge of giving the business enough flexibility to access IT however, wherever and whenever end-users need to, while keeping out intruders. Meanwhile, hackers are using ever more devious means of...
- VIRUSES. Brooks, Greg // New Media Age;1/11/2007, Special section p4
This article explains how to counter viruses in computer networks of companies. The change in the nature of viruses has run alongside the rise in the use of the Internet for business purposes. Alfred Biehler, security and management product manager at Microsoft, advised to get sort building and...
- ID Theft: Keep Your Information to Yourself. Perry, Phillip // Rural Telecommunications;Mar/Apr2004, Vol. 23 Issue 2, p62
Presents tips to protect information on computers from identity theft. Ways to block the attack of computer hackers; Advice to reduce overall computer security risks; Information on computer virus and trojan horse software.
- New research predicts digital Armageddon. // MarketWatch: Technology;February 2005, Vol. 4 Issue 2, p23
Reports on a survey aimed to collect predictions on how the Internet will affect society in the next decade in the U.S. Indications showing a wide agreement among expert respondents that at least one devastating attack will occur on the networked information infrastructure; Contentions over the...
- Why timing is crucial in the botnet wars. Biever, Celeste // New Scientist;3/4/2006, Vol. 189 Issue 2541, p32
The article focuses on dealing with computer worms. Unlike their biological counterparts, computer worms don't come out at night. Taking this into account could help computer security firms calculate when outbreaks are likely to pose the greatest risk, allowing them to set the installation of...
- Instant messaging reveals security holes. Chien, Eric // Business Journal (Central New York);10/22/2004, Vol. 18 Issue 43, p16
The article focuses on security issues related to instant messaging service. Most users of this service are unaware of the insecurities that exist within this communications tool. Worms and vulnerabilities that can give hackers remote access to susceptible computers ultimately threaten the...