Why Small and Medium Enterprises don’t use 802.1x

Wednesday, April 16th, 2008

With JJ blogging about 802.1x, I thought it would be timely to talk about why I think small and medium sized enterprises (SMEs) do not and probably never will deploy 802.1x for wired networks. I make a point of meeting with customers whenever I can. Amongst the small and medium ...

Researchers uncover undetectable chip hack

Wednesday, April 16th, 2008

For years, hackers have focused on finding bugs in computer software that give them unauthorised access to computer systems, but now there's another way to break in: hack the microprocessor. Researchers at the University of Illinois at Urbana-Champaign demonstrated how they altered a computer chip to grant attackers back-door access to ...

PayPal Outlines Strategy to Slow Phishing

Tuesday, April 15th, 2008

Over the last few years, security researchers have estimated that fake messages from PayPal and its parent company, eBay, make up more than half of all the spam sent over the Internet. So why, you may ask, isn't PayPal doing something about it? Last week at the RSA 2008 conference ...

11 Critical Security Apps

Tuesday, April 15th, 2008

If you don't have security software, your PC is an Internet mugging waiting to happen. We show you the eleven best pieces of software for defending yourself against online thugs. The PC security landscape is constantly changing. Well paid, malicious programmers keep cranking out new and different attacks, and the security ...

Advice for securing your site and your reputation

Tuesday, April 15th, 2008

Is your company's Web site hacked? Today, it can be hard to tell. Online crooks who successfully break into a site often sneak in small bits of code that leave no visible trace but can attack visitors who simply view the page. In fact, according to a Websense Security Labs report, online thugs who want ...