Entries by SecurityOrb_Staff

Trustifier Security Product

Starting from the operating system kernel itself, Trustifier security engine can inject itself into all core security layers within an operating system and into applications, where it performs checks on the operations of the applications, system services, user behaviour, device control, network usage, data processing, and more.

Hackin9 November Issue – Spyware – Someone is always watching…

In order to download the magazine you need to sign up to our newsletter. After clicking the “Download” button, you will be asked to provide your email address. You need to verify your email address using the link from the activation email you will receive. If you already subscribed to our list, you will be asked to provide your email address each time you download the magazine. No activation email will be sent and you should see the link for download.

Web Application Security: An Overview

Web developers typically do not have any formal training in the area of security and their priorities usually lie elsewhere. Business functionality and meeting tight deadlines are typically the focus areas of developers and security is often forgotten, or at most, an afterthought. This leaves the door wide open for attackers to discover vulnerabilities and exploit them to gain access to sensitive data.

New Stuxnet clues suggest sabotage of Iran’s uranium enrichment program

Stuxnet, considered by many security researchers to be the most sophisticated malware ever, targeted Windows PCs that managed large-scale industrial-control systems in manufacturing and utility companies. Those control systems, called SCADA, for “supervisory control and data acquisition,” operate everything from power plants and factory machinery to oil pipelines and military installations.

CWSP – Certified Wireless Security Professional

The CWSP exam is an advanced level wireless LAN certification developed by Planet3 Wireless. This exam is a part of the Certified Wireless Network Program (CWNP). The exam tests your ability on how well you are able to protect your company’s valuable data from hackers. For anyone desiring a career in IT or Security this is a certification you cannot afford to be without.

Why Bots are Bad News to your Network…

Any security vulnerability is potentially damaging to a business, and bots are no different. When malware programs are running on employee machines, companies have the right to worry about the safety and integrity of their data and their systems, and whether compromised information and performance could affect not just their competitiveness but their viability.

Adhering to company policies such as remote access, software downloads and patch management are all key to protecting the enterprise.