Quantcast
Channel: Internet Security
Browsing latest articles
Browse All 9 View Live

E-mail spam

E-mail spam, also known as "bulk e-mail" or "junk e-mail," is a subset of spam that involves nearly identical messages sent to numerous recipients by e-mail. A common synonym for spam is unsolicited...

View Article


70% of attacks come from internal company

Rich Brewer of International Data Corp. (IDC) commented during Directions '99 that "the perception is that most hack attacks come from political activities and professional industrial thieves, but the...

View Article


Should we concentrate on 802.11 Wireless Security?

The widespread area of 802.11 network coverage zones is one of the major reasons for rising security concerns and interest: An attacker can be positioned where no one expects him or her to be and stay...

View Article

Five key requirements for choosing the right mobile solution provider

Basically there are five key requirements for choosing the right mobile solution provider consist of: - Enterprise-class security - Application optimization with real-time push synchronization - Broad...

View Article

The Reliability of Digital Certificates and Digital Signatures

The reliability of digital certificates and digital signatures is dependent on the authenticity of the key used to verify the signature and the reliability of the technical environment.The utility of a...

View Article


Be careful when posting your resume online, Jobsites have been a target for...

Hackers have turned the harvesting of personal information from Monster.com and other large US jobsites into a lucrative black market businessA Russian gang called Phreak has created an online tool...

View Article

The top 10 reasons website get hacked

1. Cross site scripting (XSS) The “most prevalent and pernicious” Web application security vulnerability, XSS flaws happen when an application sends user data to a Web browser without first validating...

View Article

Internet Explorer 7.0 vs. Safari 3.0 vs. Firefox 3.0 Comparison in security...

Internet Explorer 7.0 vs. Safari 3.0 vs. Firefox 3.0 Comparison in security perspective CriteriaInternet Explorer 7.0Safari 3.0Firefox 3.0Out of the box configuration: In their own ways, all three of...

View Article


10 points to remember when performing online banking

Nowadays performing online banking transaction is very easy. It can be accessed anytime and anywhere. However there is also more security issue when performing this transaction. Below 10 points to...

View Article

Browsing latest articles
Browse All 9 View Live