Ninja: Total Email Security

Wednesday, April 23rd, 2008

(Source: Sunbelt Software) The volume of spam e-mails sent has increased exponentially during recent years, and so has the cost of dealing with that spam. This paper will examine the ways in which spam can impact an organization's profits and outline the criteria to consider when choosing an anti-spam ...

Researchers develop new robot-proof CAPTCHA

Wednesday, April 23rd, 2008

CAPTCHAs are becoming both ubiquitous and useless. When you visit many web sites, you have to decipher some tough-to-read text and enter it in a box before you can leave a comment or send an email. But hackers are getting better and better at developing automated systems to crack CAPTCHAs, ...

Microsoft sees huge rise in Web attacks

Tuesday, April 22nd, 2008

Criminals changed tactics in the last six months of 2007, dropping malicious email in favour of Web-based attacks, according to data reported to Microsoft by Windows users. The company saw the number of Trojan downloader programs it removed from Windows machines jump by 300 percent, according to Jimmy Kuo, principal architect ...

How to disable USB storage devices

Monday, April 21st, 2008

With all the high storage devices like the iPod classic going up to 160GB and just fitting in your inside pocket, people are getting more scared of data loss. Even Dave Lewis from Liquidmatrix recently saw someone at a client site using an iPod to pull corporate data onto it ...

The Snare Of Unauthorized Requests

Monday, April 21st, 2008

Almost everyone knows what CSRF or better unauthorized requests are. I never really embraced CSRF as the correct term for unauthorized request issues, because the term is outdated and inadequate to contemporary hacking. For me, an unauthorized request is the layer or automation of a hacking procedure without direct interference ...