Methods for the Prevention, Detection and Removal of Software Security Vulnerabilities
[ Source: Association for Computing Machinery ]
January 2008-
The announcement of another computer virus threatening the business and home computers is starting to be a regularly expected occurrence. Moreover, one has come to accept the installation of a software patch as the preferred means to stopping such viruses. This research paper focuses on source code analysis. Security experts have developed several software tools that provide a security audit of C and C++ source code. These tools, in short, check for known security vulnerabilities. ...
Anonymous Proxy: A Growing Trend in Internet Abuse, and How to Defeat it
[ Source: Bloxx, Inc. ]
October 2008-
Anonymous proxies are an unseen threat - a student's or employee's backdoor to malicious or productivity-sapping sites on the Internet. If your URL filtering solution relies on the old-school URL database/keyword approach, your ship is leaking and you may not see the holes.
With hundreds of new proxy sites created each day, traditional URL filtering just can't keep up, even when supplemented by standard keyword analysis. What follows is a primer on ...
Top 5: The Largest Malware Delivery Networks
[ Source: Blue Coat ]
November 2011-
The Blue Coat 2011 Mid-Year Security Report described the powerful tools that make malware delivery networks successful: dynamic web links that enable cybercrime to change out payload servers and avoid detection. Last year, the malware web delivery infrastructure was hacking into popular and trusted domains where cybercriminals can display lures beyond the reach of reputation filters and web category blocking.
With an eye on acceptable-use policies, the lures often inhabit categories such as Online ...
White Paper on Antivirus
[ Source: Bulwark Systems ]
January 2008-
This paper from Bulwark Systems explains corporate protection that starts at the Internet Gateway, the main entrance for viruses, malware and digital attacks. Antivirus for Web Server protects the data traffic of company handled via HTTP, HTTP over FTP or directly via FTP. It enables risk-free surfing and downloading without loss of performance and reliably prevents infected contents from being sent and received. Antivirus for Mail Server checks the complete incoming and outgoing SMTP data ...
The Threats You Face: Why Total Protection Matters
[ Source: CA (Computer Associates) ]
January 2008-
A third of small-sized businesses and mid-sized businesses have suffered at least some disruption due to security issues. Just as threatening are business losses caused by compromised data integrity or privacy - as well as disasters and accidents beyond anyones control. This paper published by Computer Associates (CA) describes the dangers business faces as well as the techniques that can help one mitigate or even eliminate them. Because of the Internet, email and instant ...
Integrating the CorreLog Security Correlation Server with McAfee ePolicy Orchestrator (ePO)
[ Source: CorreLog ]
October 2011-
This white paper provides a detailed discussion of objectives and methodologies for integrating CorreLog software with McAfee ePolicy Orchestrator (ePO) software. This document also describes the features and capabilities of the implementation, intended as a top-level description of how to add CorreLog's Security Information and Event Management (SIEM) functions with the ePO software system, to create a single unified system.
Options for Backing Up Your Computer
[ Source: ESET ]
July 2012-
While personal computers range in cost from a few hundred to a few thousand dollars, a computer is a physical object, and it can be replaced. What really makes your computer valuable is what's unique about it, and that is your data - your business records, pictures, audio and video recordings, and documents you have saved over the years. Read to learn more about how to keep your data safe.
Ten Ways To Dodge CyberBullets: Reloaded
[ Source: ESET ]
July 2012-
In the frequently changing threat landscape, as cyber-criminals and security companies constantly introduce new techniques and countermeasures, the basic principles of self-defense stay the same, so even while detail changes, the underlying advice remains critical to protection.
Trends for 2012: Malware Goes Mobile
[ Source: ESET ]
July 2012-
The ways in which people are accustomed to using technology have always influenced and determined malware development and that trend will continue. With the significant growth in the use of mobile devices, malware developers have been working to make these platforms a viable entry point for malicious code infection.
Keeping Secrets: Good Password Practice
[ Source: ESET ]
July 2012-
Alternative and supplementary forms of authentication have become far more common (and affordable), but the humble password remains the somewhat crumbling gatehouse to many a security structure. Learn how to tighten the weakest link of your security system.