hack

Results 301 - 325 of 342Sort Results By: Published Date | Title | Company Name

CIPA - Keeping Students Safe on the Net

Published By: Cyberoam     Published Date: Apr 19, 2007
Protecting students from the millions of sites that house pornography, adult chat rooms, violence & hacking can provide not just a safe surfing atmosphere to minors in schools and libraries, but also qualify the institutions for federal E-rate funding through compliance with CIPA - the Children's Internet Protection Act.
Tags : 
cipa, cipa compliance, cyberoam, cyberroam, chat room, hacking, childrends internet protection act, monitoring, compliance, hacker detection, internet security, security management, secure instant messaging, employee performance, desktop management
    
Cyberoam

How to Detect Hackers on Your Web Server

Published By: GFI     Published Date: Jun 14, 2007
This white paper shows where GFI EventsManager fits in this picture and how it is an invaluable asset in the corporate toolbox.
Tags : 
hacker detection, hackers, ips, ids, intrusion detection, intrusion prevention, internet security, events manager, events management, security monitoring, gfi, web service security
    
GFI

PDF Spam: A Step Ahead of Image Spam

Published By: GFI     Published Date: Jul 24, 2007
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. The latest tactic is to use the common PDF file format to send image spam. By using PDF attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : 
adobe, adobe acrobat, acrobat, gfi, spam, image spam, pdf spam, anti-spam, anti spam, email security, zombie, zombies, botnet, botnets, hacker, vulnerability, filtering, blocking, mailessentials, mail essentials
    
GFI

System Monitoring: Seeing is Believing for IBM System i Managers

Published By: CCSS     Published Date: Jul 05, 2007
Capability breeds dependence. The more you can do, the more is asked of you. The more time you save, the more time you spend seeking out ways to save more time or money. If less really is more, how do you do more with less? Effective system monitoring could help you break free of the system shackles and use your System i (iSeries) network to save time and money.
Tags : 
ibm, system monitoring, monitoring, network monitoring, productivity, performance management, system performance, memory pool performance, memory pool, lpar, system configuration, performance monitoring, ccss, it management, network management, it spending, system management software
    
CCSS

Where Online Hackers Are Headed in 2007

Published By: Perimeter     Published Date: Jul 17, 2007
Click here and get a head start on these Hackers by learning how they are turning their attention to new ways to deliver viruses, crash unsuspecting users’ computers, and steal social security numbers, passwords, bank account numbers, etc.
Tags : 
vulnerability, hacker, hacker detection, hacker prevention, ips, intrusion prevention, intrusion detection, ids, spam, spam filtering, security policies, gateway av, risk management, perimeter, perimeter esecurity, anti spam, email security, internet security, patch management
    
Perimeter

A Cyber War has Begun

Published By: Technolytics     Published Date: Oct 05, 2007
Recently, a series of cyber attacks on the Defense Department and Defense contractors in the United States as well as the Ministry of Defense and Parliament in the U.K. have created significant cause-for-concern by computer security experts. It is imperative you read this brief and learn how we're all vulnerable and what is being done to prevent these Cyber Attacks.
Tags : 
spy ops, spy-ops, cyber attack, hacker, hackers, government, internet security, national security, network security, intrusion, intrusion detection, intrusion prevention, trojan, risk management, cyberwarfare, cyber warfare, technolytics, hacker detection, data protection, database security
    
Technolytics

Self-Service Password Management

Published By: Netwrix     Published Date: Apr 22, 2008
Password practices that improve security are by their nature burdensome to the user, resulting in passwords difficult to remember which are often changed about the same time they have finally become memorized. Yet password security remains a cornerstone of system security: as much as 80% of security breaches take place not through arcane hacking and virus attacks, but through system infiltration facilitated by use of a password.
Tags : 
netwrix, authentication, passwords, password management, identity theft, fraud, login, access control
    
Netwrix

Wiegand Security Compromised

Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
At the Defcon security conference on August 2007, a hacker and Defcon staffer who goes by the name Zac Franken, showed how a small homemade device he calls "Gecko", which can perform a hack on the type of access card readers used on office doors throughout the country.
Tags : 
security, security management, access control, identity management, iam, authentication, wiegand, tracking, workforce, workforce management, employee management, borer, access control, wiegand, security, borer, borer data systems, hacker, defcon, zac franken
    
Borer Data Systems Ltd.

Testing Password Safety: A Key to Securing a Corporate Network

Published By: ElcomSoft     Published Date: Dec 06, 2007
Information protection gets much attention these days. Many have realized that their data is a treasure, which not only should be treated properly, but should be protected as well. So a few dollars spent on defending against security threats now can reap millions in avoiding future losses due to hacking of your enterprise network.
Tags : 
passwords, password, password management, security management, good password, bad password, data protection, elcomsoft, intrusion prevention
    
ElcomSoft

The Final Buying Decision: Integrated Vs. Compatible

Published By: CopiaTECH     Published Date: Mar 18, 2008
Words like “integrated” and “centralized” have been used to describe application software solutions for some years now, often because of marketing messaging that implies more interoperability than the given technology can actually provide to the business customer. The terms are broad enough to be almost meaningless in some instances. In the field of IT security, the sheer range of tools and techniques in the hacker or virus writer’s armory that one must guard against has driven up the number of solutions required to prevent attacks.
Tags : 
copiatech, security, intrusion prevention, total cost of ownership
    
CopiaTECH

The Silent Battlefield: America's Alarming Vulnerability to Cyber Attack

Published By: HP - Enterprise     Published Date: Oct 16, 2008
As the military and US government rely more heavily on custom-built applications for communications and management, they also become more vulnerable to cyber attacks. Worse, according to the Dept. of Homeland Security, the number of attacks on custom-built applications is doubling every year. Learn about critical threats, methods that military and civilian agencies can use to deal with cyber attacks and technologies that improve security for custom-built applications.
Tags : 
security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, department of homeland security, us government, military agency, civilian agency, military, compliance, hacker detection
    
HP - Enterprise

The silent danger of a clever malware

Published By: Symantec.cloud     Published Date: Aug 10, 2010
This paper will discuss the history and progression of the modern Trojan attack. It will explore the methodology used by hackers in selecting a target and developing a compelling attack and will cite several examples of some successful targeted Trojans.
Tags : 
messagelabs, symantec hosted services, malware, trojan attack, email guard, spam, anti spam, anti spyware, anti virus, email security, security management
    
Symantec.cloud

Web Tech 2011 Report

Published By: HackerTarget.com LLC     Published Date: Apr 27, 2011
Report detailing the web technologies in use by the worlds top 1 million websites.
Tags : 
web technology, security, cms, websites, server side scripting
    
HackerTarget.com LLC

Best practices for implementing 2048-bit SSL

Published By: Citrix Systems     Published Date: Feb 18, 2012
Ready for 2048-bit SSL? The Iron Age is officially over. The Cloud Age is here. Don't let stronger security compromise performance. Download the Citrix and Verisign White Paper and the NetScaler Performance Comparison now.
Tags : 
2048-bit ssl, security, ssl, performance, citrix, verisign, netscaler, cloud, protection, hacking, ecommerce, traffic, ssl everywhere always-on, encryption, application, application performance management, best practices, business activity monitoring, risk management, database security
    
Citrix Systems

Social Business Impact in Retail

Published By: Spredfast, Inc.     Published Date: Sep 05, 2013
Learn how top retail brands like Radioshack, REI, Jason’s Deli, HomeAway, and Whole Foods Market deliver business impact through social.
Tags : 
spredfast, social media, ecommerce, retail, social content, optimization, consumers, branding
    
Spredfast, Inc.

Here’s a social story about building and rewarding brand advocates from RadioShack, a national elect

Published By: Spredfast, Inc.     Published Date: Mar 04, 2014
Here’s a social story about building and rewarding brand advocates from RadioShack, a national electronics retailer.
Tags : 
spredfast, marketing, social strategy, media strategy, social network, consumer behaviors
    
Spredfast, Inc.

The Legal and Commercial Risks and Issues to Consider When Managing Emails

Published By: Mimecast     Published Date: Jun 04, 2013
With recent high profile cases, such as the News of the World hacking scandal, hitting the news headlines, the issue of email retention has quickly moved up the IT Director’s agenda.
Tags : 
email archiving, ediscovery, compliance, legal, intrusion prevention, security, access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, business continuity, disaster recovery, email security, encryption, high availability, security management
    
Mimecast

Proteção contra técnicas de evasão avançadas

Published By: McAfee     Published Date: Aug 15, 2014
Atualmente, o paradigma de segurança de rede está mudando rumo a uma nova realidade, pois os métodos avançados dos hackers estão cada vez mais predominantes e difíceis de detectar. Um exemplo desses métodos são as técnicas de evasão avançadas (AET, Advanced Evasion Technique). Embora tenham sido documentadas inúmeras evasões nos últimos 15 anos, os fornecedores de segurança ignoraram sistematicamente sua importância.
Tags : 
    
McAfee

Securing Your Small Business Online

Published By: Symantec Corporation     Published Date: Oct 09, 2014
Hackers are taking aim at your small business website. Defend yourself—and your customers—with strong, affordable online security.
Tags : 
hackers, online security, cyberattacks, affordable, security
    
Symantec Corporation

Into the Breach: A Look at Real Incidents from the Case Files

Published By: Varonis     Published Date: Nov 12, 2013
Verizon’s longstanding Data Breach Investigations Report1, or DBIR, is an excellent starting point to understand the larger trends in security and data protection.
Tags : 
varonis, medical insurer, mortgage lender, retailer, data breach investigations report, dbir, larger trends, security, data protection, global scale, breach activity, validated breach incidents, collect personal details, hackers, breach statistics, security decisions, exposed data, it deficiencies, access control, web service security
    
Varonis

EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture

Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally. The paper explains that no manually handling of files, such as with USB drives, is unnecessary when you set up a secure network architecture using five zones of protection. You can transfer files to and from your network around the globe, and know the data and the network are secure, automatically scanning files to block dangerous data while allowing "clean" data into the network. The paper notes several reasons why it matters that data is secure while remaining accessible.
Tags : 
viruses, malware, hackers, leaks, supply chain interruptions, stuxnet, scada, usb, multi-zone architecture, dmz, security, it management, document management, information management, secure content management, content management
    
Globalscape

The Security Industry’s Dirty Little Secret - The Debate Over Advanced Evasion Techniques (AETs)

Published By: McAfee     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats, networking, application security, authentication, business continuity, ddos, disaster recovery, encryption, firewalls, hacker detection, network security appliance, security management
    
McAfee

The Security Industry’s Dirty Little Secret - The debate over advanced evasion techniques (AETs)

Published By: Intel Security     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats, security
    
Intel Security

Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization

Published By: Mimecast     Published Date: Jun 24, 2015
The article is a helpful reminder that your employees often make life easier for attackers by being the weakest link in your network defenses. Social media is a rich hunting ground for hackers. Names, locations, photos, interests, connections, partnerships, vacation details, email addresses and phone numbers – this is often the information that hackers use to target specific employees through well-crafted, highly personalized emails.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management, knowledge management, data management
    
Mimecast

Trend Brief - 5 Essential Elements of Mobile Security

Published By: VMware AirWatch     Published Date: May 19, 2016
In the cacophony of business headlines, news of data security breaches come through like a high-tempo drum beat. In fact, the number of incidents keeps growing at a rate of 66 percent CAGR, with a cost per breach of $5.9 million. And some of the world’s most recognized brands are sustaining bruises to their reputations and harmful hits to their bottom lines as they scramble to repair the damages. Enterprise IT organizations are facing an elusive enemy perpetrators who range from sophisticated cyber criminals and government-sponsored spies to hackers and script kiddies, and who have motives as diverse as money, politics, or simply youthful mischief.
Tags : 
data security, enterprise, data protection, mobile security, anti spyware, access control, application security, hacker detection, identity management, network security appliance, security management
    
VMware AirWatch
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.