Fourteen fabulous Internet tools and most of them free – Part 2

Read Part 1 of this story. E-Mail and IM The Internet is all about communications--but as we all know, it is not always as easy to communicate as we would like. These downloads

Share on LinkedIn Comment on this article Share with Google+ Published on: June 23rd, 2008 Preston Gralla

Misconfigured, virus-laden laptop nearly ruins a life

Last week, prosecutors dropped their year-old case after a state investigation of Michael Fiola's computer determined there was insufficient evidence to prove he had downloaded the files."We could not meet our burden of

Share on LinkedIn Comment on this article Share with Google+ Published on: June 19th, 2008 Robert McMillan

There’s a cyber war looming and we’re doing little about it

"Rogue" states and criminal organizations have stepped up their capabilities to launch crippling online attacks, says technology strategist who has briefed U.S. members of Congress on threats of a "cyber war".That's the bad

Share on LinkedIn Comment on this article Share with Google+ Published on: June 18th, 2008 Nestor Arellano

Dumb and dumber – Legendary bloopers committed by IT admins

For those of us who make our living behind a keyboard in IT, it's hard to imagine a more time-tested vulnerability than the end user. Armed with network access, these IT viruses wreak

Share on LinkedIn Comment on this article Share with Google+ Published on: June 18th, 2008 Andrew Brandt

ING DIRECT builds Rapport – offers free anti-phishing software

Consumers just don't feel very good about handing over their personal information to online banks, and that's a situation ING DIRECT hopes to change by offering a free anti-phishing software download, according to

Share on LinkedIn Comment on this article Share with Google+ Published on: June 5th, 2008 Brian Jackson

Ten powerful – and free – security downloads for Windows PCs

To use an Internet-connected computer is to be insecure and place your privacy in danger. Spyware, viruses, Trojans and assorted malware are everywhere on the Net, trying to hop onto your PC and

Share on LinkedIn Comment on this article Share with Google+ Published on: June 2nd, 2008 Preston Gralla

Rent-a-botnet service makes launching attacks easier

Online fraudsters that aren't highly skilled in the arts of cyber crime can now rent a service that offers an all-in-one hosting server with a built-in Zeus trojan administration panel and infecting tools,

Share on LinkedIn Comment on this article Share with Google+ Published on: May 16th, 2008 Andrew Hendrey

Malware menace growing – and what you can do about it

Large businesses using social networking tools are vulnerable to far greater security attacks than their systems are equipped to handle, say Internet security experts.In addition Web-based technologies such as VoIP (voice over Internet

Share on LinkedIn Comment on this article Share with Google+ Published on: May 16th, 2008 Nestor Arellano

Financial group uses next-generation firewall as data security vault

Western & Southern Financial Group had what it considered defense in depth for its IP network but recognized that there were still ways that sensitive data might leave the network undetected, so it

Share on LinkedIn Comment on this article Share with Google+ Published on: May 9th, 2008 Tim Greene

New EMC appliance blends storage and security features

A recently launched software package that integrates data storage with encryption and key management technologies may be a good option for companies looking for a single device that combines these capabilities, industry insiders

Share on LinkedIn Comment on this article Share with Google+ Published on: April 20th, 2008 Nestor Arellano

CEOs, senior mangers’ computers hacked in fake subpoenas scam

Panos Anastassiadis didn't click on the fake subpoena that popped into his Inbox on Monday morning, but he runs a computer security company. Others were not so lucky. In fact, security researchers say

Share on LinkedIn Comment on this article Share with Google+ Published on: April 18th, 2008 Robert MacMillan

Are signature-based antivirus tools dead?

Antivirus softwaremakes Greg Shipley so mad he has to laugh."The relationship between signature-based antivirus companies and the virus writers is almost comical. One releases something and then the other reacts, and they go

Share on LinkedIn Comment on this article Share with Google+ Published on: April 10th, 2008 Michael Fitzgerald

Malware threats have more than quadrupled

There was an explosion in the number of malicious attacks in 2007 conducted largely through exploits on social networking Web sites and browser plug-ins, according to Symantec Canada Corp. The computer security vendor

Share on LinkedIn Comment on this article Share with Google+ Published on: April 8th, 2008 Brian Jackson

New reputation tools foil treacherous Web 2.0 hack attacks

Reputation-measurement is one of the newer ways of blocking malware in a world where threats have grown more elaborate and cunning, and Web 2.0 has grown the audience for rich media.While the continuing

Share on LinkedIn Comment on this article Share with Google+ Published on: April 4th, 2008 Stephen Bell